WorldWideScience

Sample records for one-way key rates

  1. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  2. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  3. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    Kern, Oliver

    2009-01-01

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  4. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  5. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  6. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  7. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  8. Decoy-state quantum key distribution with two-way classical postprocessing

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, C.-H.F.; Chen Kai; Lo, H.-K.; Dupuis, Frederic; Tamaki, Kiyoshi

    2006-01-01

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously, data postprocessing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data postprocessing schemes for the decoy-state method using two-way classical communications. Our numerical simulation (using parameters from a specific QKD experiment as an example) results show that our scheme is able to extend the maximal secure distance from 142 km (using only one-way classical communications with decoy states) to 181 km. The second scheme is able to achieve a 10% greater key generation rate in the whole regime of distances. We conclude that decoy-state QKD with two-way classical postprocessing is of practical interest

  9. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection

    International Nuclear Information System (INIS)

    Sun Maozhu; Peng Xiang; Guo Hong

    2013-01-01

    We propose an improved two-way continuous-variable quantum key distribution (CV QKD) protocol by adding proper random noise on the receiver’s homodyne detection, the security of which is analysed against general collective attacks. The simulation result under the collective entangling cloner attack indicates that despite the correlation between two-way channels decreasing the secret key rate relative to the uncorrelated channels slightly, the performance of the two-way protocol is still far beyond that of the one-way protocols. Importantly, the added noise in detection is beneficial for the secret key rate and the tolerable excess noise of this two-way protocol. With the reasonable reconciliation efficiency of 90%, the two-way CV QKD with added noise allows the distribution of secret keys over 60 km fibre distance. (paper)

  10. Improved two-way six-state protocol for quantum key distribution

    International Nuclear Information System (INIS)

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  11. Improved two-way six-state protocol for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  12. A practical two-way system of quantum key distribution with untrusted source

    International Nuclear Information System (INIS)

    Chen Ming-Juan; Liu Xiang

    2011-01-01

    The most severe problem of a two-way 'plug-and-play' (p and p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an “untrusted source . This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. (general)

  13. Two-way quantum key distribution at telecommunication wavelength

    International Nuclear Information System (INIS)

    Kumar, Rupesh; Lucamarini, Marco; Di Giuseppe, Giovanni; Natali, Riccardo; Mancini, Giorgio; Tombesi, Paolo

    2008-01-01

    We report on a quantum key distribution effected with a two-way deterministic protocol over a standard telecommunication fiber. Despite the common belief of a prohibitive loss rate for such a scheme, our results show its feasibility on distances of few tenths of kilometers

  14. One way quantum repeaters with quantum Reed-Solomon codes

    OpenAIRE

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-01-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of $d$-level systems for large dimension $d$. We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generation of quantum repeaters using quan...

  15. One-way quantum repeaters with quantum Reed-Solomon codes

    Science.gov (United States)

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-05-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of d -level systems for large dimension d . We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generations of quantum repeaters using quantum Reed-Solomon codes and identify parameter regimes where each generation performs the best.

  16. A Latent Class Multidimensional Scaling Model for Two-Way One-Mode Continuous Rating Dissimilarity Data

    Science.gov (United States)

    Vera, J. Fernando; Macias, Rodrigo; Heiser, Willem J.

    2009-01-01

    In this paper, we propose a cluster-MDS model for two-way one-mode continuous rating dissimilarity data. The model aims at partitioning the objects into classes and simultaneously representing the cluster centers in a low-dimensional space. Under the normal distribution assumption, a latent class model is developed in terms of the set of…

  17. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Energy Technology Data Exchange (ETDEWEB)

    Myhr, Geir Ove

    2010-11-08

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  18. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    International Nuclear Information System (INIS)

    Myhr, Geir Ove

    2010-01-01

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  19. Moments Based Framework for Performance Analysis of One-Way/Two-Way CSI-Assisted AF Relaying

    KAUST Repository

    Xia, Minghua

    2012-09-01

    When analyzing system performance of conventional one-way relaying or advanced two-way relaying, these two techniques are always dealt with separately and, thus, their performance cannot be compared efficiently. Moreover, for ease of mathematical tractability, channels considered in such studies are generally assumed to be subject to Rayleigh fading or to be Nakagami-$m$ channels with integer fading parameters, which is impractical in typical urban environments. In this paper, we propose a unified moments-based framework for general performance analysis of channel-state-information (CSI) assisted amplify-and-forward (AF) relaying systems. The framework is applicable to both one-way and two-way relaying over arbitrary Nakagami-$m$ fading channels, and it includes previously reported results as special cases. Specifically, the mathematical framework is firstly developed under the umbrella of the weighted harmonic mean of two Gamma-distributed variables in conjunction with the theory of Pad\\\\\\'e approximants. Then, general expressions for the received signal-to-noise ratios of the users in one-way/two-way relaying systems and the corresponding moments, moment generation function, and cumulative density function are established. Subsequently, the mathematical framework is applied to analyze, compare, and gain insights into system performance of one-way and two-way relaying techniques, in terms of outage probability, average symbol error probability, and achievable data rate. All analytical results are corroborated by simulation results as well as previously reported results whenever available, and they are shown to be efficient tools to evaluate and compare system performance of one-way and two-way relaying.

  20. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  1. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  2. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  3. Time–energy high-dimensional one-side device-independent quantum key distribution

    International Nuclear Information System (INIS)

    Bao Hai-Ze; Bao Wan-Su; Wang Yang; Chen Rui-Ke; Ma Hong-Xin; Zhou Chun; Li Hong-Wei

    2017-01-01

    Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. (paper)

  4. Efficient Constructions for One-way Hash Chains

    National Research Council Canada - National Science Library

    Hu, Yih-Chun; Jakobsson, Markus; Perrig, Adrian

    2003-01-01

    .... Our first construction, the Sandwich-chain, provides a smaller bandwidth overhead for one-way chain values, and enables efficient verification of one-way chain values if the trusted one-way chain value is far away...

  5. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  6. One Step Quantum Key Distribution Based on EPR Entanglement.

    Science.gov (United States)

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  7. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  8. Fermionic One-Way Quantum Computation

    International Nuclear Information System (INIS)

    Cao Xin; Shang Yun

    2014-01-01

    Fermions, as another major class of quantum particles, could be taken as carriers for quantum information processing beyond spins or bosons. In this work, we consider the fermionic generalization of the one-way quantum computation model and find that one-way quantum computation can also be simulated with fermions. In detail, using the n → 2n encoding scheme from a spin system to a fermion system, we introduce the fermionic cluster state, then the universal computing power with a fermionic cluster state is demonstrated explicitly. Furthermore, we show that the fermionic cluster state can be created only by measurements on at most four modes with |+〉 f (fermionic Bell state) being free

  9. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  10. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  11. One-Way Functions and Composition of Conjugacy and Discrete Logarithm Problems in the Small Cancellation Groups

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2015-01-01

    Full Text Available The paper considers the possibility for building a one-way function in the small cancellation group. Thus, it uses the algorithm to solve the problem for a cyclic subgroup, also known as a discrete logarithm problem, and the algorithm to solve the word problem in this class of groups.Research is conducted using geometric methods of combinatorial group theory (the method of diagrams in groups.In public channel exchange of information are used one-way functions, direct calculation of which should be much less complicated than the calculation of the inverse function. The paper considers the combination of two problems: discrete logarithms and conjugacy. This leads to the problem of conjugate membership for a cyclic subgroup. The work proposes an algorithm based on this problem, which can be used as a basis in investigation of the appropriate one-way function for its fitness to build a public key distribution scheme.The study used doughnut charts of word conjugacy, and for one special class of such charts has been proven a property of the layer-based periodicity. The presence of such properties is obviously leads to a solution of the power conjugacy of words in the considered class of groups. Unfortunately, this study failed to show any periodicity of a doughnut chart, but for one of two possible classes this periodicity has been proven.The building process of one-way function considered in the paper was studied in terms of possibility to calculate both direct and inverse mappings. The computational complexity was not considered. Thus, the following two tasks were yet unresolved: determining the quality of one-way function in the above protocol of the public key distribution and completing the study of the periodicity of doughnut charts of word conjugacy, leading to a positive solution of the power conjugacy of words in the class groups under consideration.

  12. Tag-KEM from Set Partial Domain One-Way Permutations

    Science.gov (United States)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  13. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Comparative analysis of the performance of One-Way and Two-Way urban road networks

    Science.gov (United States)

    Gheorghe, Carmen

    2017-10-01

    The fact that the number of vehicles is increasing year after year represents a challenge in road traffic management because it is necessary to adjust the road traffic, in order to prevent any incidents, using mostly the same road infrastructure. At this moment one-way road network provides efficient traffic flow for vehicles but it is not ideal for pedestrians. Therefore, a proper solution must be found and applied when and where it is necessary. Replacing one-way road network with two-way road network may be a viable solution especially if in the area is high pedestrian traffic. The paper aims to highlight the influence of both, one-way and two-way urban road networks through an experimental research which was performed by using traffic data collected in the field. Each of the two scenarios analyzed were based on the same traffic data, the same geometrical conditions of the road (lane width, total road segment width, road slopes, total length of the road network) and also the same signaling conditions (signalised intersection or roundabout). The analysis which involves two-way scenario reveals changes in the performance parameters like delay average, stops average, delay stop average and vehicle speed average. Based on the values obtained, it was possible to perform a comparative analysis between the real, one-way, scenario and the theoretical, two-way, scenario.

  16. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    Science.gov (United States)

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  17. Deterministic one-way simulation of two-way, real-time cellular automata and its related problems

    Energy Technology Data Exchange (ETDEWEB)

    Umeo, H; Morita, K; Sugata, K

    1982-06-13

    The authors show that for any deterministic two-way, real-time cellular automaton, m, there exists a deterministic one-way cellular automation which can simulate m in twice real-time. Moreover the authors present a new type of deterministic one-way cellular automata, called circular cellular automata, which are computationally equivalent to deterministic two-way cellular automata. 7 references.

  18. Application of one-way ANOVA in completely randomized experiments

    Science.gov (United States)

    Wahid, Zaharah; Izwan Latiff, Ahmad; Ahmad, Kartini

    2017-12-01

    This paper describes an application of a statistical technique one-way ANOVA in completely randomized experiments with three replicates. This technique was employed to a single factor with four levels and multiple observations at each level. The aim of this study is to investigate the relationship between chemical oxygen demand index and location on-sites. Two different approaches are employed for the analyses; critical value and p-value. It also presents key assumptions of the technique to be satisfied by the data in order to obtain valid results. Pairwise comparisons by Turkey method are also considered and discussed to determine where the significant differences among the means is after the ANOVA has been performed. The results revealed that there are statistically significant relationship exist between the chemical oxygen demand index and the location on-sites.

  19. Efficient quantum circuits for one-way quantum computing.

    Science.gov (United States)

    Tanamoto, Tetsufumi; Liu, Yu-Xi; Hu, Xuedong; Nori, Franco

    2009-03-13

    While Ising-type interactions are ideal for implementing controlled phase flip gates in one-way quantum computing, natural interactions between solid-state qubits are most often described by either the XY or the Heisenberg models. We show an efficient way of generating cluster states directly using either the imaginary SWAP (iSWAP) gate for the XY model, or the sqrt[SWAP] gate for the Heisenberg model. Our approach thus makes one-way quantum computing more feasible for solid-state devices.

  20. FVCOM one-way and two-way nesting using ESMF: Development and validation

    Science.gov (United States)

    Qi, Jianhua; Chen, Changsheng; Beardsley, Robert C.

    2018-04-01

    Built on the Earth System Modeling Framework (ESMF), the one-way and two-way nesting methods were implemented into the unstructured-grid Finite-Volume Community Ocean Model (FVCOM). These methods help utilize the unstructured-grid multi-domain nesting of FVCOM with an aim at resolving the multi-scale physical and ecosystem processes. A detail of procedures on implementing FVCOM into ESMF was described. The experiments were made to validate and evaluate the performance of the nested-grid FVCOM system. The first was made for a wave-current interaction case with a two-domain nesting with an emphasis on qualifying a critical need of nesting to resolve a high-resolution feature near the coast and harbor with little loss in computational efficiency. The second was conducted for the pseudo river plume cases to examine the differences in the model-simulated salinity between one-way and two-way nesting approaches and evaluate the performance of mass conservative two-way nesting method. The third was carried out for the river plume case in the realistic geometric domain in Mass Bay, supporting the importance for having the two-way nesting for coastal-estuarine integrated modeling. The nesting method described in this paper has been used in the Northeast Coastal Ocean Forecast System (NECOFS)-a global-regional-coastal nesting FVCOM system that has been placed into the end-to-end forecast and hindcast operations since 2007.

  1. Improvement of two-way continuous variable quantum cryptography by using additional noise

    International Nuclear Information System (INIS)

    Wang Minjie; Pan Wei

    2010-01-01

    The performance of quantum key distribution such as one-way continuous variable protocols, can be increased by adding some noise on the reference side of error correction in the error-correction phase. For this reason, we here study this possibility in the case of two-way continuous variable system. Finally, the numerical results show that the using of additional noise gives two-way schemes better security performance in terms of secret key rates and resistance to channel excess noise.

  2. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  3. Quantum-locked key distribution at nearly the classical capacity rate.

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  4. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  5. One-way mode transmission in one-dimensional phononic crystal plates

    Science.gov (United States)

    Zhu, Xuefeng; Zou, Xinye; Liang, Bin; Cheng, Jianchun

    2010-12-01

    We investigate theoretically the band structures of one-dimensional phononic crystal (PC) plates with both antisymmetric and symmetric structures, and show how unidirectional transmission behavior can be obtained for either antisymmetric waves (A modes) or symmetric waves (S modes) by exploiting mode conversion and selection in the linear plate systems. The theoretical approach is illustrated for one PC plate example where unidirectional transmission behavior is obtained in certain frequency bands. Employing harmonic frequency analysis, we numerically demonstrate the one-way mode transmission for the PC plate with finite superlattice by calculating the steady-state displacement fields under A modes source (or S modes source) in forward and backward direction, respectively. The results show that the incident waves from A modes source (or S modes source) are transformed into S modes waves (or A modes waves) after passing through the superlattice in the forward direction and the Lamb wave rejections in the backward direction are striking with a power extinction ratio of more than 1000. The present structure can be easily extended to two-dimensional PC plate and efficiently encourage practical studies of experimental realization which is believed to have much significance for one-way Lamb wave mode transmission.

  6. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    International Nuclear Information System (INIS)

    Ma Hong-Xin; Bao Wan-Su; Li Hong-Wei; Chou Chun

    2016-01-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. (paper)

  7. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  8. One-way entangled-photon autocompensating quantum cryptography

    International Nuclear Information System (INIS)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2003-01-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert's two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes

  9. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  10. Accuracy & Computational Considerations for Wide--Angle One--way Seismic Propagators and Multiple Scattering by Invariant Embedding

    Science.gov (United States)

    Thomson, C. J.

    2004-12-01

    Pseudodifferential operators (PSDOs) yield in principle exact one--way seismic wave equations, which are attractive both conceptually and for their promise of computational efficiency. The one--way operators can be extended to include multiple--scattering effects, again in principle exactly. In practice approximations must be made and, as an example, the variable--wavespeed Helmholtz equation for scalar waves in two space dimensions is here factorized to give the one--way wave equation. This simple case permits clear identification of a sequence of physically reasonable approximations to be used when the mathematically exact PSDO one--way equation is implemented on a computer. As intuition suggests, these approximations hinge on the medium gradients in the direction transverse to the main propagation direction. A key point is that narrow--angle approximations are to be avoided in the interests of accuracy. Another key consideration stems from the fact that the so--called ``standard--ordering'' PSDO indicates how lateral interpolation of the velocity structure can significantly reduce computational costs associated with the Fourier or plane--wave synthesis lying at the heart of the calculations. The decision on whether a slow or a fast Fourier transform code should be used rests upon how many lateral model parameters are truly distinct. A third important point is that the PSDO theory shows what approximations are necessary in order to generate an exponential one--way propagator for the laterally varying case, representing the intuitive extension of classical integral--transform solutions for a laterally homogeneous medium. This exponential propagator suggests the use of larger discrete step sizes, and it can also be used to approach phase--screen like approximations (though the latter are not the main interest here). Numerical comparisons with finite--difference solutions will be presented in order to assess the approximations being made and to gain an understanding

  11. Experimental all-optical one-way quantum computing

    International Nuclear Information System (INIS)

    Prevedel, R.

    2009-01-01

    In recent years, the relatively new field of quantum information processing (QIP) has attracted the attention of many scientists around the world due to its promise of increased computational speed, absolute secure communication and the potential to simulate complex quantum mechanical systems. The very essence of this new quantum information technology are two concepts at the very heart of quantum mechanics, namely superposition and entanglement. The present Thesis contains the results of four different experiments that were all aimed at the demonstration of an entirely new model for quantum computing with linear optics, the 'one-way' quantum computer. For this purpose a multi-photon entangled state of four photons has been generated via the process of spontaneous parametric down-conversion and by using an interferometric setup. This entangled state acts as a resource that allowed for novel demonstrations of quantum algorithms and relevant experimental techniques. By exploiting the advances developed in both theory and experiment, in this Thesis we report the implementation of fast, active feed-forward that allowed, for the first time, the realization of deterministic linear optics quantum computing at an unprecedented speed. Further we were able to demonstrate the Deutsch algorithm on our one-way quantum computer, an important quantum algorithm that is capable of distinguishing whether a function is constant or balanced. Classically one needs to query the algorithm at least 2N/2 + 1 times for an N-bit binary input string, however, in the quantum regime, this can be done with one evaluation of the algorithm, independent of the size of the input. In another experiment we succeeded in playing an instance of a quantum game - the so-called Prisoner's dilemma - on our one-way quantum computer. Playing such a game is essentially the execution of a quantum algorithm made up of a distinct set of one- and two-qubit gates. This allows the individual players to increase their

  12. One-way spatial integration of hyperbolic equations

    Science.gov (United States)

    Towne, Aaron; Colonius, Tim

    2015-11-01

    In this paper, we develop and demonstrate a method for constructing well-posed one-way approximations of linear hyperbolic systems. We use a semi-discrete approach that allows the method to be applied to a wider class of problems than existing methods based on analytical factorization of idealized dispersion relations. After establishing the existence of an exact one-way equation for systems whose coefficients do not vary along the axis of integration, efficient approximations of the one-way operator are constructed by generalizing techniques previously used to create nonreflecting boundary conditions. When physically justified, the method can be applied to systems with slowly varying coefficients in the direction of integration. To demonstrate the accuracy and computational efficiency of the approach, the method is applied to model problems in acoustics and fluid dynamics via the linearized Euler equations; in particular we consider the scattering of sound waves from a vortex and the evolution of hydrodynamic wavepackets in a spatially evolving jet. The latter problem shows the potential of the method to offer a systematic, convergent alternative to ad hoc regularizations such as the parabolized stability equations.

  13. Quantum key distribution with two-segment quantum repeaters

    Energy Technology Data Exchange (ETDEWEB)

    Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2014-07-01

    Quantum repeaters represent one possible way to achieve long-distance quantum key distribution. One way of improving the repeater rate and decreasing the memory coherence time is the usage of multiplexing. Motivated by the experimental fact that long-range connections are practically demanding, we extend the analysis of the quantum repeater multiplexing protocol to the case of short-range connections. We derive formulas for the repeater rate and we show that short-range connections lead to most of the benefits of a full-range multiplexing protocol. A less demanding QKD-protocol without quantum memories was recently introduced by Lo et al. We generalize this measurement-device-independent quantum key Distribution protocol to the scenario where the repeater Station contains also heralded quantum memories. We assume either single-photon sources or weak coherent pulse sources plus decay states. We show that it is possible to significantly outperform the original proposal, even in presence of decoherence of the quantum memory. We give formulas in terms of device imperfections i.e., the quantum bit error rate and the repeater rate.

  14. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    International Nuclear Information System (INIS)

    Zhang, Yichen; Zhao, Yijia; Yu, Song; Li, Zhengyu; Guo, Hong

    2017-01-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol. (paper)

  15. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-01-01

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single

  16. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  17. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Science.gov (United States)

    Bella, Simone Dalla; Palmer, Caroline

    2011-01-01

    We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity) of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  18. Exact Markov chain and approximate diffusion solution for haploid genetic drift with one-way mutation.

    Science.gov (United States)

    Hössjer, Ola; Tyvand, Peder A; Miloh, Touvia

    2016-02-01

    The classical Kimura solution of the diffusion equation is investigated for a haploid random mating (Wright-Fisher) model, with one-way mutations and initial-value specified by the founder population. The validity of the transient diffusion solution is checked by exact Markov chain computations, using a Jordan decomposition of the transition matrix. The conclusion is that the one-way diffusion model mostly works well, although the rate of convergence depends on the initial allele frequency and the mutation rate. The diffusion approximation is poor for mutation rates so low that the non-fixation boundary is regular. When this happens we perturb the diffusion solution around the non-fixation boundary and obtain a more accurate approximation that takes quasi-fixation of the mutant allele into account. The main application is to quantify how fast a specific genetic variant of the infinite alleles model is lost. We also discuss extensions of the quasi-fixation approach to other models with small mutation rates. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    Energy Technology Data Exchange (ETDEWEB)

    Datta, Shounak, E-mail: shounak.datta@bose.res.in; Goswami, Suchetana, E-mail: suchetana.goswami@bose.res.in; Pramanik, Tanumoy, E-mail: tanu.pram99@bose.res.in; Majumdar, A.S., E-mail: archan@bose.res.in

    2017-03-11

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  20. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    International Nuclear Information System (INIS)

    Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A.S.

    2017-01-01

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  1. One-way quantum computing in superconducting circuits

    Science.gov (United States)

    Albarrán-Arriagada, F.; Alvarado Barrios, G.; Sanz, M.; Romero, G.; Lamata, L.; Retamal, J. C.; Solano, E.

    2018-03-01

    We propose a method for the implementation of one-way quantum computing in superconducting circuits. Measurement-based quantum computing is a universal quantum computation paradigm in which an initial cluster state provides the quantum resource, while the iteration of sequential measurements and local rotations encodes the quantum algorithm. Up to now, technical constraints have limited a scalable approach to this quantum computing alternative. The initial cluster state can be generated with available controlled-phase gates, while the quantum algorithm makes use of high-fidelity readout and coherent feedforward. With current technology, we estimate that quantum algorithms with above 20 qubits may be implemented in the path toward quantum supremacy. Moreover, we propose an alternative initial state with properties of maximal persistence and maximal connectedness, reducing the required resources of one-way quantum computing protocols.

  2. Sum-Rate Optimization in a Two-Way Relay Network with Buffering

    DEFF Research Database (Denmark)

    Liu, Huaping; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    A Relay Station (RS) uses a buffer to store and process the received data packets before forwarding them. Recently, the buffer has been exploited in one-way relaying to opportunistically schedule the two different links according to their channel quality. The intuition is that, if the channel...... to the destination is poor, then RS stores more data from the source, in order to use it when the channel to the destination is good. We apply this intuition to the case of half-duplex two-way relaying, where the interactions among the buffers and links become more complex. We investigate the sum-rate maximization...

  3. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Science.gov (United States)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  4. Robust and scalable optical one-way quantum computation

    International Nuclear Information System (INIS)

    Wang Hefeng; Yang Chuiping; Nori, Franco

    2010-01-01

    We propose an efficient approach for deterministically generating scalable cluster states with photons. This approach involves unitary transformations performed on atoms coupled to optical cavities. Its operation cost scales linearly with the number of qubits in the cluster state, and photon qubits are encoded such that single-qubit operations can be easily implemented by using linear optics. Robust optical one-way quantum computation can be performed since cluster states can be stored in atoms and then transferred to photons that can be easily operated and measured. Therefore, this proposal could help in performing robust large-scale optical one-way quantum computation.

  5. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Directory of Open Access Journals (Sweden)

    Simone Dalla Bella

    Full Text Available We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  6. Fundamentals of universality in one-way quantum computation

    International Nuclear Information System (INIS)

    Nest, M van den; Duer, W; Miyake, A; Briegel, H J

    2007-01-01

    In this paper, we build a framework allowing for a systematic investigation of the fundamental issue: 'Which quantum states serve as universal resources for measurement-based (one-way) quantum computation?' We start our study by re-examining what is exactly meant by 'universality' in quantum computation, and what the implications are for universal one-way quantum computation. Given the framework of a measurement-based quantum computer, where quantum information is processed by local operations only, we find that the most general universal one-way quantum computer is one which is capable of accepting arbitrary classical inputs and producing arbitrary quantum outputs-we refer to this property as CQ-universality. We then show that a systematic study of CQ-universality in one-way quantum computation is possible by identifying entanglement features that are required to be present in every universal resource. In particular, we find that a large class of entanglement measures must reach its supremum on every universal resource. These insights are used to identify several families of states as being not universal, such as one-dimensional (1D) cluster states, Greenberger-Horne-Zeilinger (GHZ) states, W states, and ground states of non-critical 1D spin systems. Our criteria are strengthened by considering the efficiency of a quantum computation, and we find that entanglement measures must obey a certain scaling law with the system size for all efficient universal resources. This again leads to examples of non-universal resources, such as, e.g. ground states of critical 1D spin systems. On the other hand, we provide several examples of efficient universal resources, namely graph states corresponding to hexagonal, triangular and Kagome lattices. Finally, we consider the more general notion of encoded CQ-universality, where quantum outputs are allowed to be produced in an encoded form. Again we provide entanglement-based criteria for encoded universality. Moreover, we present a

  7. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  8. Device-independent secret-key-rate analysis for quantum repeaters

    Science.gov (United States)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  9. Efficient one-way quantum computations for quantum error correction

    International Nuclear Information System (INIS)

    Huang Wei; Wei Zhaohui

    2009-01-01

    We show how to explicitly construct an O(nd) size and constant quantum depth circuit which encodes any given n-qubit stabilizer code with d generators. Our construction is derived using the graphic description for stabilizer codes and the one-way quantum computation model. Our result demonstrates how to use cluster states as scalable resources for many multi-qubit entangled states and how to use the one-way quantum computation model to improve the design of quantum algorithms.

  10. The discussion on a new measure method of radon chamber leak rate

    International Nuclear Information System (INIS)

    Zhang Junkui; Tang Bing

    2010-01-01

    Radon chamber is the third standard radon source. The leak rate is the key parameter for the radon chamber to naturally and safely operate. One way, that measure the leak rate is introduced. The experience result is that the way is simple and veracious to measure the leak rate. (authors)

  11. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers

    International Nuclear Information System (INIS)

    Zhang, Yi-Chen; Yu, Song; Gu, Wanyi; Li, Zhengyu; Sun, Maozhu; Peng, Xiang; Guo, Hong; Weedbrook, Christian

    2014-01-01

    The imperfections of a receiver's detector affect the performance of two-way continuous-variable (CV) quantum key distribution (QKD) protocols and are difficult to adjust in practical situations. We propose a method to improve the performance of two-way CV-QKD by adding a parameter-adjustable optical amplifier at the receiver. A security analysis is derived against a two-mode collective entangling cloner attack. Our simulations show that the proposed method can improve the performance of protocols as long as the inherent noise of the amplifier is lower than a critical value, defined as the tolerable amplifier noise. Furthermore, the optimal performance can approach the scenario where a perfect detector is used. (paper)

  12. One-Way Deficit and Quantum Phase Transitions in XX Model

    Science.gov (United States)

    Wang, Yao-Kun; Zhang, Yu-Ran

    2018-02-01

    Quantum correlations including entanglement and quantum discord have drawn much attention in characterizing quantum phase transitions. Quantum deficit originates in questions regarding work extraction from quantum systems coupled to a heat bath (Oppenheim et al. Phys. Rev. Lett. 89, 180402, 2002). It links quantum thermodynamics with quantum correlations and provides a new standpoint for understanding quantum non-locality. In this paper, we evaluate the one-way deficit of two adjacent spins in the bulk for the XX model. In the thermodynamic limit, the XX model undergoes a first order transition from fully polarized to a critical phase with quasi-long-range order with decrease of quantum parameter. We find that the one-way deficit becomes nonzero after the critical point. Therefore, the one-way deficit characterizes the quantum phase transition in the XX model.

  13. Demonstration of Multisetting One-Way Einstein-Podolsky-Rosen Steering in Two-Qubit Systems

    Science.gov (United States)

    Xiao, Ya; Ye, Xiang-Jun; Sun, Kai; Xu, Jin-Shi; Li, Chuan-Feng; Guo, Guang-Can

    2017-04-01

    Einstein-Podolsky-Rosen (EPR) steering describes the ability of one party to remotely affect another's state through local measurements. One of the most distinguishable properties of EPR steering is its asymmetric aspect. Steering can work in one direction but fail in the opposite direction. This type of one-way steering, which is different from the symmetry concepts of entanglement and Bell nonlocality, has garnered much interest. However, an experimental demonstration of genuine one-way EPR steering in the simplest scenario, i.e., one that employs two-qubit systems, is still lacking. In this Letter, we experimentally demonstrate one-way EPR steering with multimeasurement settings for a class of two-qubit states, which are still one-way steerable even with infinite settings. The steerability is quantified by the steering radius, which represents a necessary and sufficient steering criterion. The demonstrated one-way steering in the simplest bipartite quantum system is of fundamental interest and may provide potential applications in one-way quantum information tasks.

  14. A fault-tolerant one-way quantum computer

    International Nuclear Information System (INIS)

    Raussendorf, R.; Harrington, J.; Goyal, K.

    2006-01-01

    We describe a fault-tolerant one-way quantum computer on cluster states in three dimensions. The presented scheme uses methods of topological error correction resulting from a link between cluster states and surface codes. The error threshold is 1.4% for local depolarizing error and 0.11% for each source in an error model with preparation-, gate-, storage-, and measurement errors

  15. The Mass Outflow Rate of the Milky Way

    Science.gov (United States)

    Fox, Andrew

    2017-08-01

    The balance between gaseous inflow and outflow regulates star formation in spiral galaxies. This paradigm can be tested in the Milky Way, but whereas the star formation rate and inflow rate have both been measured, the outflow rate has not. We propose an archival COS program to determine the Galactic outflow rate in cool gas ( 10^4 K) by surveying UV absorption line high-velocity clouds (HVCs). This project will make use of the newly updated Hubble Spectroscopic Legacy Archive, which contains a uniformly reduced sample of 233 COS G130M spectra of background AGN. The outflow rate will be determined by (1) searching for redshifted HVCs; (2) modeling the clouds with photoionization simulations to determine their masses and physical properties; (3) combining the cloud masses with their velocities and distances. We will measure how the outflow is distributed spatially across the sky, calculate its mass loading factor, and compare the line profiles to synthetic spectra extracted from new hydrodynamic simulations. The distribution of HVC velocities will inform us what fraction of the outflowing clouds will escape the halo and what fraction will circulate back to the disk, to better understand how and where gas enters and exits the Milky Way.

  16. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  17. One-way membrane trafficking of SOS in receptor-triggered Ras activation.

    Science.gov (United States)

    Christensen, Sune M; Tu, Hsiung-Lin; Jun, Jesse E; Alvarez, Steven; Triplet, Meredith G; Iwig, Jeffrey S; Yadav, Kamlesh K; Bar-Sagi, Dafna; Roose, Jeroen P; Groves, Jay T

    2016-09-01

    SOS is a key activator of the small GTPase Ras. In cells, SOS-Ras signaling is thought to be initiated predominantly by membrane recruitment of SOS via the adaptor Grb2 and balanced by rapidly reversible Grb2-SOS binding kinetics. However, SOS has multiple protein and lipid interactions that provide linkage to the membrane. In reconstituted-membrane experiments, these Grb2-independent interactions were sufficient to retain human SOS on the membrane for many minutes, during which a single SOS molecule could processively activate thousands of Ras molecules. These observations raised questions concerning how receptors maintain control of SOS in cells and how membrane-recruited SOS is ultimately released. We addressed these questions in quantitative assays of reconstituted SOS-deficient chicken B-cell signaling systems combined with single-molecule measurements in supported membranes. These studies revealed an essentially one-way trafficking process in which membrane-recruited SOS remains trapped on the membrane and continuously activates Ras until being actively removed via endocytosis.

  18. One-Way Fluid-Structure Interaction Simulation of an Offshore Wind Turbine

    Directory of Open Access Journals (Sweden)

    Zhi-Kui Wang

    2014-07-01

    Full Text Available The Fluid-Structure Interaction (FSI has gained great interest of scholars recently, meanwhile, extensive studies have been conducted by the virtue of numerical methods which have been implemented on wind turbine models. The blades of a wind turbine have been gained a deep insight into the FSI analyses, however, few studies have been conducted on the tower and nacelle, which are key components of the wind turbine, using this method. We performed the one-way FSI analysis on a 2-MW offshore wind turbine, using the Finite Volume Method (FVM with ANSYS CFX solver and the RNG k-ε turbulence model, to achieve a comprehensive cognition of it. The grid convergence was studied and verified in this study, and the torque value is chosen to determine the optimal case. The superior case, which was chosen to conduct the FSI analysis, with a relative error is only 2.15%, thus, the accuracy of results is credible.

  19. Detection technology research on the one-way clutch of automatic brake adjuster

    Science.gov (United States)

    Jiang, Wensong; Luo, Zai; Lu, Yi

    2013-10-01

    In this article, we provide a new testing method to evaluate the acceptable quality of the one-way clutch of automatic brake adjuster. To analysis the suitable adjusting brake moment which keeps the automatic brake adjuster out of failure, we build a mechanical model of one-way clutch according to the structure and the working principle of one-way clutch. The ranges of adjusting brake moment both clockwise and anti-clockwise can be calculated through the mechanical model of one-way clutch. Its critical moment, as well, are picked up as the ideal values of adjusting brake moment to evaluate the acceptable quality of one-way clutch of automatic brake adjuster. we calculate the ideal values of critical moment depending on the different structure of one-way clutch based on its mechanical model before the adjusting brake moment test begin. In addition, an experimental apparatus, which the uncertainty of measurement is ±0.1Nm, is specially designed to test the adjusting brake moment both clockwise and anti-clockwise. Than we can judge the acceptable quality of one-way clutch of automatic brake adjuster by comparing the test results and the ideal values instead of the EXP. In fact, the evaluation standard of adjusting brake moment applied on the project are still using the EXP provided by manufacturer currently in China, but it would be unavailable when the material of one-way clutch changed. Five kinds of automatic brake adjusters are used in the verification experiment to verify the accuracy of the test method. The experimental results show that the experimental values of adjusting brake moment both clockwise and anti-clockwise are within the ranges of theoretical results. The testing method provided by this article vividly meet the requirements of manufacturer's standard.

  20. A Novel Through Capacity Model for One-way Channel Based on Characteristics of the Vessel Traffic Flow

    Directory of Open Access Journals (Sweden)

    Yuanyuan Nie

    2017-09-01

    Full Text Available Vessel traffic flow is a key parameter for channel-through capacity and is of great significance to vessel traffic management, channel and port design and navigational risk evaluation. Based on the study of parameters of characteristics of vessel traffic flow related to channel-through capacity, this paper puts forward a brand-new mathematical model for one-way channel-through capacity in which parameters of channel length, vessel arrival rate and velocity difference in different vessels are involved and a theoretical calculating mechanism for the channel-through capacity is provided. In order to verify availability and reliability of the model, extensive simulation studies have been carried out and based on the historical AIS data, an analytical case study on the Xiazhimen Channel validating the proposed model is presented. Both simulation studies and the case study show that the proposed model is valid and all relative parameters can be readjusted and optimized to further improve the channel-through capacity. Thus, all studies demonstrate that the model is valuable for channel design and vessel management.

  1. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  2. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  3. Performance Analysis of a Forecasting Relocation Model for One-Way Carsharing

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2017-06-01

    Full Text Available A carsharing service can be seen as a transport alternative between private and public transport that enables a group of people to share vehicles based at certain stations. The advanced carsharing service, one-way carsharing, enables customers to return the car to another station. However, one-way implementation generates an imbalanced distribution of cars in each station. Thus, this paper proposes forecasting relocation to solve car distribution imbalances for one-way carsharing services. A discrete event simulation model was developed to help evaluate the proposed model performance. A real case dataset was used to find the best simulation result. The results provide a clear insight into the impact of forecasting relocation on high system utilization and the reservation acceptance ratio compared to traditional relocation methods.

  4. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  5. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  6. Experimental demonstration of deterministic one-way quantum computing on a NMR quantum computer

    OpenAIRE

    Ju, Chenyong; Zhu, Jing; Peng, Xinhua; Chong, Bo; Zhou, Xianyi; Du, Jiangfeng

    2008-01-01

    One-way quantum computing is an important and novel approach to quantum computation. By exploiting the existing particle-particle interactions, we report the first experimental realization of the complete process of deterministic one-way quantum Deutsch-Josza algorithm in NMR, including graph state preparation, single-qubit measurements and feed-forward corrections. The findings in our experiment may shed light on the future scalable one-way quantum computation.

  7. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  8. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  9. Modified one-way coupled map lattices as communication cryptosystems

    International Nuclear Information System (INIS)

    Zhao Mingchao; Li Kezan; Fu Xinchu

    2009-01-01

    In this paper, we modify the original communication cryptosystem based on OCML (one-way coupled map lattices), and present a modified OCML communication cryptosystem. The modified OCML communication cryptosystem is shown to have some additional advantages compared to the original one, e.g., it has a larger parameter space, and is more capable of anti-error analysis. And, we apply this modified OCML communication cryptosystem for multiplex OCML communication.

  10. Students' Ways of Thinking about Two-Variable Functions and Rate of Change in Space

    Science.gov (United States)

    Weber, Eric David

    2012-01-01

    This dissertation describes an investigation of four students' ways of thinking about functions of two variables and rate of change of those two-variable functions. Most secondary, introductory algebra, pre-calculus, and first and second semester calculus courses do not require students to think about functions of more than one variable. Yet…

  11. Measurement of one-way velocity of light and light-year

    Science.gov (United States)

    Chen, Shao-Guang

    For space science and astronomy the fundamentality of one-way velocity of light (OWVL) is selfevident. The measurement of OWVL (distance / interval) and the clock synchronization with light-signal transfer make a logical circulation. This means that OWVL could not be directly measured but only come indirectly from astronomical method (Romer's Io eclipse and Bradley's sidereal aberration). Furthermore, the light-year by definitional OWVL and the trigonometry distance with AU are also un-measurable. In this report two methods of clock synchronization to solve this problem were proposed: The arriving-time difference of longitudinal-transverse wave (Ts - Tp) or ordinary-extraordinary light (Te - To) is measured by single clock at one end of a dual-speed transmission-line, the signal transmission-delay (from sending-end time Tx to receiving-end time Tp or To) calculated with wave-speed ratio is: (Tp -Tx) = (Ts -Tp) / ((Vp / Vs) - 1) or: (To -Tx) = (Te - To) / ((Vo / Ve ) - 1), where (Vp / Vs) = (E / k) 1/2 is Yang's / shear elastic-modulus ratio obtained by comparing two strains at same stress, (Vo / Ve) = (ne / no) is extraordinary/ordinary light refractive-index ratio obtained by comparing two deflection-angles. Then, two clocks at transmission-line two ends can be synchronized directly to measure the one-way velocity of light and light-year, which work as one earthquakestation with single clock measures first-shake-time and the distance to epicenter. The readings Na and Nb of two counters Ca and Cb with distance L are transferred into a computer C by two leads with transmission-delay Tac and Tbc respectively. The computer progressing subtraction operation exports steady value: (Nb - Na) = f (Ta - Tb ) + f (Tac - Tbc ), where f is the frequency of light-wave always passing Ca and Cb, Ta and Tb are the count-start time of Ca and Cb respectively. From the transmission-delay possess the spatial translational and rotational invariability, the computer exports steady value

  12. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    Science.gov (United States)

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  13. Independent attacks in imperfect settings: A case for a two-way quantum key distribution scheme

    International Nuclear Information System (INIS)

    Shaari, J.S.; Bahari, Iskandar

    2010-01-01

    We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.

  14. One-way Ponderomotive Barrier in a Uniform Magnetic Field

    International Nuclear Information System (INIS)

    Dodin, I.Y.; Fisch, N.J.

    2005-01-01

    The possibility of an asymmetric ponderomotive barrier in a nonuniform dc magnetic field by high-frequency radiation near the cyclotron resonance for selected plasma species was contemplated in Physics of Plasmas 11 (November 2004) 5046-5064. Here we show that a similar one-way barrier, which reflects particles incident from one side while transmitting those incident from the opposite side, can be produced also in a uniform magnetic field, entirely due to inhomogeneity of high-frequency drive

  15. On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution

    International Nuclear Information System (INIS)

    Johnson, Sarah J; Ong, Lawrence; Shirvanimoghaddam, Mahyar; Lance, Andrew M; Symul, Thomas; Ralph, T C

    2017-01-01

    The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel—an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates. (paper)

  16. [Extracorporeal ventriculoatrial shunt with the use of one-way ball valve].

    Science.gov (United States)

    Kubo, Shigeki; Takimoto, Hiroshi; Hosoi, Kazuki; Toyota, Shingo; Takakura, Shuji; Hayashi, Yasuhiro; Ueno, Masato; Morisako, Toshitaka; Karasawa, Jun; Ninaga, Hideo; Yoshimine, Toshiki

    2002-04-01

    We developed a simple system of an "extracorporeal" ventriculoatrial (VA) shunt using a one-way ball valve (Acty valve II, Kaneka Medix) to release the patient from postoperative constraint during the ventricular drainage. The system is constructed in such a way that the ventricular drainage tube is connected to the central venous catheter via a one-way valve. The CSF is regulated by using the valve and is diverted into the systemic circulation as in the conventional ventriculoatrial shunt. After 2 or 3 weeks of CSF diversion through the extracorporeal VA shunt, a ventriculoperitoneal shunt is placed if hydrocephalus is apparent by temporary occlusion of the system. We applied this system to 4 patients with hydrocephalus, and we found it useful and free from adverse effects. The patient was freed from physical constraint involved in conventional ventricular drainage and an effective program of early rehabilitation was able to be started.

  17. Mathematical investigation of one-way transform matrix options

    International Nuclear Information System (INIS)

    Cooper, James Arlin

    2006-01-01

    One-way transforms have been used in weapon systems processors since the mid- to late-1970s in order to help recognize insertion of correct pre-arm information while maintaining abnormal-environment safety. Level-One, Level-Two, and Level-Three transforms have been designed. The Level-One and Level-Two transforms have been implemented in weapon systems, and both of these transforms are equivalent to matrix multiplication applied to the inserted information. The Level-Two transform, utilizing a 6 x 6 matrix, provided the basis for the ''System 2'' interface definition for Unique-Signal digital communication between aircraft and attached weapons. The investigation described in this report was carried out to find out if there were other size matrices that would be equivalent to the 6 x 6 Level-Two matrix. One reason for the investigation was to find out whether or not other dimensions were possible, and if so, to derive implementation options. Another important reason was to more fully explore the potential for inadvertent inversion. The results were that additional implementation methods were discovered, but no inversion weaknesses were revealed

  18. Observation of one-way Einstein-Podolsky-Rosen steering

    Science.gov (United States)

    Händchen, Vitus; Eberle, Tobias; Steinlechner, Sebastian; Samblowski, Aiko; Franz, Torsten; Werner, Reinhard F.; Schnabel, Roman

    2012-09-01

    The distinctive non-classical features of quantum physics were first discussed in the seminal paper by A. Einstein, B. Podolsky and N. Rosen (EPR) in 1935. In his immediate response, E. Schrödinger introduced the notion of entanglement, now seen as the essential resource in quantum information as well as in quantum metrology. Furthermore, he showed that at the core of the EPR argument is a phenomenon that he called steering. In contrast to entanglement and violations of Bell's inequalities, steering implies a direction between the parties involved. Recent theoretical works have precisely defined this property, but the question arose as to whether there are bipartite states showing steering only in one direction. Here, we present an experimental realization of two entangled Gaussian modes of light that in fact shows the steering effect in one direction but not in the other. The generated one-way steering gives a new insight into quantum physics and may open a new field of applications in quantum information.

  19. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  20. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    museums, but is also relevant to ongoing collection practices. An important theme in relation to source communities is ownership and repatriation of cultural objects. Furthermore, working with source communities implies a two-way information process through which groups are given access to memory...

  1. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  2. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  3. Experimental realization of a quantum game on a one-way quantum computer

    International Nuclear Information System (INIS)

    Prevedel, Robert; Stefanov, Andre; Walther, Philip; Zeilinger, Anton

    2007-01-01

    We report the first demonstration of a quantum game on an all-optical one-way quantum computer. Following a recent theoretical proposal we implement a quantum version of Prisoner's Dilemma, where the quantum circuit is realized by a four-qubit box-cluster configuration and the player's local strategies by measurements performed on the physical qubits of the cluster. This demonstration underlines the strength and versatility of the one-way model and we expect that this will trigger further interest in designing quantum protocols and algorithms to be tested in state-of-the-art cluster resources

  4. One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3-T (6

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2014-01-01

    Full Text Available In this work we are consider a possibility to create schemes of open key distribution in the groups meeting conditions C(3-T(6. Our constructions use the following algorithms.1. The algorithm that solves the membership problem for cyclic subgroups, also known as the discrete logarithm problem.2. The algorithm that solves the word problem in this class of groups.Our approach is based on the geometric methods of combinatorial group theory (the method of diagrams in groups.In a cryptographic scheme based on the open key distribution one-way functions are used, i.e. functions direct calculation of which must be much easier than that of the inverse one. Our task was to construct a one-way function using groups with small cancelation conditions C(3-T(6 and to compare the calculation complexity of this function with the calculation complexity of its inverse.P.W. Shor has shown in the paper that there exists a polynomial algorithm that can be implemented in a quantum computer to solve the discrete logarithm problem in the groups of units of finite fields and the rings of congruences mod n. This stimulated a series of investigations trying to find alternative complicated mathematical problems that can be used for construction of new asymmetric cryptosystems. For example, open key distribution systems based on the conjugacy problem in matrix groups and the braid groups were proposed.In the other papers the constructions used the discrete logarithm problem in the groups of inner automorphisms of semi-direct products of SL(2,Z and Zp and GL(2,Zp and Zp. groups. The paper of E. Sakalauskas, P. Tvarijonas, A. Raulinaitis proposed a scheme that uses a composition of two problems of group theory, namely the conjugacy problem and the discrete logarithm problem.Our results show that the scheme that we propose is of polynomial complexity. Therefore its security is not sufficient for further applications in communications. However the security can be improved

  5. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  6. True amplitude wave equation migration arising from true amplitude one-way wave equations

    Science.gov (United States)

    Zhang, Yu; Zhang, Guanquan; Bleistein, Norman

    2003-10-01

    One-way wave operators are powerful tools for use in forward modelling and inversion. Their implementation, however, involves introduction of the square root of an operator as a pseudo-differential operator. Furthermore, a simple factoring of the wave operator produces one-way wave equations that yield the same travel times as the full wave equation, but do not yield accurate amplitudes except for homogeneous media and for almost all points in heterogeneous media. Here, we present augmented one-way wave equations. We show that these equations yield solutions for which the leading order asymptotic amplitude as well as the travel time satisfy the same differential equations as the corresponding functions for the full wave equation. Exact representations of the square-root operator appearing in these differential equations are elusive, except in cases in which the heterogeneity of the medium is independent of the transverse spatial variables. Here, we address the fully heterogeneous case. Singling out depth as the preferred direction of propagation, we introduce a representation of the square-root operator as an integral in which a rational function of the transverse Laplacian appears in the integrand. This allows us to carry out explicit asymptotic analysis of the resulting one-way wave equations. To do this, we introduce an auxiliary function that satisfies a lower dimensional wave equation in transverse spatial variables only. We prove that ray theory for these one-way wave equations leads to one-way eikonal equations and the correct leading order transport equation for the full wave equation. We then introduce appropriate boundary conditions at z = 0 to generate waves at depth whose quotient leads to a reflector map and an estimate of the ray theoretical reflection coefficient on the reflector. Thus, these true amplitude one-way wave equations lead to a 'true amplitude wave equation migration' (WEM) method. In fact, we prove that applying the WEM imaging condition

  7. On the experimental determination of the one-way speed of light

    International Nuclear Information System (INIS)

    Perez, Israel

    2011-01-01

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  8. On the experimental determination of the one-way speed of light

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Israel, E-mail: cooguion@yahoo.com, E-mail: iperez@cicese.mx [Department of Applied Physics, Optics Division, CICESE, Carretera Ensena da-Tijuana 3918, Zona Playitas, CP 22860, Ensenada, Baja California (Mexico)

    2011-07-15

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  9. Acoustic one-way mode conversion and transmission by sonic crystal waveguides

    Science.gov (United States)

    Ouyang, Shiliang; He, Hailong; He, Zhaojian; Deng, Ke; Zhao, Heping

    2016-09-01

    We proposed a scheme to achieve one-way acoustic propagation and even-odd mode switching in two mutually perpendicular sonic crystal waveguides connected by a resonant cavity. The even mode in the entrance waveguide is able to switch to the odd mode in the exit waveguide through a symmetry match between the cavity resonant modes and the waveguide modes. Conversely, the odd mode in the exit waveguide is unable to be converted into the even mode in the entrance waveguide as incident waves and eigenmodes are mismatched in their symmetries at the waveguide exit. This one-way mechanism can be applied to design an acoustic diode for acoustic integration devices and can be used as a convertor of the acoustic waveguide modes.

  10. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Dan, E-mail: liudanhu725@126.com [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Hu, Sen [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Gao, Yihua [Wuhan National Laboratory for Optoelectronics (WNLO), School of Physics, Huazhong University of Science and Technology (HUST), Wuhan, 430074 (China)

    2017-07-12

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%. - Highlights: • Photonic crystal heterojunction with circular and square scatterers is first studied. • One-way transmission efficiency is closely related to the hetero-interface. • Wide-band and efficient one-way transmission is realized.

  11. Study of the one-way speed of light anisotropy with particle beams

    Energy Technology Data Exchange (ETDEWEB)

    Wojtsekhowski, Bogdan B. [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States)

    2017-04-01

    Concepts of high precision studies of the one-way speed of light anisotropy are discussed. The high energy particle beam allows measurement of a one-way speed of light anisotropy (SOLA) via analysis of the beam momentum variation with sidereal phase without the use of synchronized clocks. High precision beam position monitors could provide accurate monitoring of the beam orbit and determination of the particle beam momentum with relative accuracy on the level of 10^-10, which corresponds to a limit on SOLA of 10^-18 with existing storage rings. A few additional versions of the experiment are also presented.

  12. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton.

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-02-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range.

  13. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    Science.gov (United States)

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  14. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-01-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range. PMID:27877739

  15. One-way EPR steering and genuine multipartite EPR steering

    Science.gov (United States)

    He, Qiongyi; Reid, Margaret D.

    2012-11-01

    We propose criteria and experimental strategies to realise the Einstein-Podolsky-Rosen (EPR) steering nonlocality. One-way steering can be obtained where there is asymmetry of thermal noise on each system. We also present EPR steering inequalities that act as signatures and suggest how to optimise EPR correlations in specific schemes so that the genuine multipartite EPR steering nonlocality (EPR paradox) can also possibly be realised. The results presented here also apply to the spatially separated macroscopic atomic ensembles.

  16. System and method for determining an ammonia generation rate in a three-way catalyst

    Science.gov (United States)

    Sun, Min; Perry, Kevin L; Kim, Chang H

    2014-12-30

    A system according to the principles of the present disclosure includes a rate determination module, a storage level determination module, and an air/fuel ratio control module. The rate determination module determines an ammonia generation rate in a three-way catalyst based on a reaction efficiency and a reactant level. The storage level determination module determines an ammonia storage level in a selective catalytic reduction (SCR) catalyst positioned downstream from the three-way catalyst based on the ammonia generation rate. The air/fuel ratio control module controls an air/fuel ratio of an engine based on the ammonia storage level.

  17. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  18. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  19. ONE WAY ANOVA RANDOMIZED COMPLETE BLOCKS

    African Journals Online (AJOL)

    ******

    2012-04-24

    Apr 24, 2012 ... Key words: Grey mullet, growth, foreign DNA, genetically modified. INTRODUCTION ... ration, food quality and preservation (Shears et al., 1991;. Chen et al. ... fish eggs (Khoo et al., 1992) and 4) direct injection of foreign DNA ...

  20. Performance Comparison of Reservation Based and Instant Access One-Way Car Sharing Service through Discrete Event Simulation

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2015-09-01

    Full Text Available A car sharing service has been highlighted as a new urban transport alternative for an environmentally friendly economy. As the demand for the service from customers increases, car sharing operators need to introduce a new service such as a one-way option that will allow customers to return the car to different stations. Due to the complexity of the one-way system, it needs to be managed and optimized for real cases. This paper focuses on developing a simulation model in order to help operators evaluate the performance of the one-way service. In addition, this research demonstrates a strategy for an open one-way service that can increase revenue and customer satisfaction. A real case dataset is used for investigation to find the best result from the simulation. The result showed that the total number of cars, number of one-way reservations and station size have an impact on one-way performance. Thus, company profit and customer satisfaction can be maximized by optimizing these factors.

  1. On the Achievable Rate-Regions for the Gaussian Two-way Diamond Channels

    Directory of Open Access Journals (Sweden)

    F. Askarian

    2015-12-01

    Full Text Available In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC. In the CF-MAC, the TR nodes transmit their messages to the relay nodes which are followed by a simultaneous communication from the relay nodes to the TRs. Adopting rate splitting method in the terminal encoders and then using Compute-and-Forward (CF relaying and decoding the sum of messages at the relay nodes, an achievable rate region for this channel is obtained. To this end, we use a superposition coding based on lattice codes. Using numerical results, we show that our proposed scheme has better performance than other similar methods and achieves a tighter gap to the outer bound.

  2. How the growth rate of host cells affects cancer risk in a deterministic way

    Science.gov (United States)

    Draghi, Clément; Viger, Louise; Denis, Fabrice; Letellier, Christophe

    2017-09-01

    It is well known that cancers are significantly more often encountered in some tissues than in other ones. In this paper, by using a deterministic model describing the interactions between host, effector immune and tumor cells at the tissue level, we show that this can be explained by the dependency of tumor growth on parameter values characterizing the type as well as the state of the tissue considered due to the "way of life" (environmental factors, food consumption, drinking or smoking habits, etc.). Our approach is purely deterministic and, consequently, the strong correlation (r = 0.99) between the number of detectable growing tumors and the growth rate of cells from the nesting tissue can be explained without evoking random mutation arising during DNA replications in nonmalignant cells or "bad luck". Strategies to limit the mortality induced by cancer could therefore be well based on improving the way of life, that is, by better preserving the tissue where mutant cells randomly arise.

  3. Two-way against one-way nesting for climate downscaling in Europe and the Mediterranean region using LMDZ4

    Science.gov (United States)

    Li, Shan; Li, Laurent; Le Treut, Hervé

    2016-04-01

    In the 21st century, the estimated surface temperature warming projected by General Circulation Models (GCMs) is between 0.3 and 4.8 °C, depending on the scenario considered. GCMs exhibit a good representation of climate on a global scale, but they are not able to reproduce regional climate processes with the same level of accuracy. Society and policymakers need model projections to define climate change adaptation and mitigation policies on a global, regional and local scale. Climate downscaling is mostly conducted with a regional model nested into the outputs of a global model. This one-way nesting approach is generally used in the climate community without feedbacks from Regional Climate Models (RCMs) to GCMs. This lack of interaction between the two models may affect regional modes of variability, in particular those with a boundary conflict. The objective of this study is to evaluate a two-way nesting configuration that makes an interactive coupling between the RCM and the GCM, an approach against the traditional configuration of one-way nesting system. An additional aim of this work is to examine if the two-way nesting system can improve the RCM performance. The atmospheric component of the IPSL integrated climate model (LMDZ) is configured at both regional (LMDZ-regional) and global (LMDZ-global) scales. The two models have the same configuration for the dynamical framework and the physical forcings. The climatology values of sea surface temperature (SST) are prescribed for the two models. The stretched-grid of LMDZ-global is applied to a region defined by Europe, the Mediterranean, North Africa and Western North Atlantic. To ensure a good statistical significance of results, all simulations last at least 80 years. The nesting process of models is performed by a relaxation procedure of a time scale of 90 minutes. In the case of two-way nesting, the exchange between the two models is every two hours. The relaxation procedure induces a boundary conflict

  4. Behavior of one-way reinforced concrete slabs subjected to fire

    Directory of Open Access Journals (Sweden)

    Said M. Allam

    2013-12-01

    Full Text Available A finite difference analysis was performed to investigate the behavior of one-way reinforced concrete slabs exposed to fire. The objective of the study was to investigate the fire resistance and the fire risk after extinguishing the fire. Firstly, the fire resistance was obtained using the ISO834 standard fire without cooling phase. Secondly, the ISO834 parametric fire with cooling phase was applied to study the effect of cooling time. Accordingly, the critical time for cooling was identified and the corresponding failure time was calculated. Moreover, the maximum risk time which is the time between the fire extinguishing and the collapse of slab was obtained. Sixteen one-way reinforced concrete slabs were considered to study the effect of important parameters namely: the concrete cover thickness; the plaster; and the live load ratio. Equations for heat transfer through the slab thickness were used in the fire resistance calculations. Studying the cooling time revealed that the slabs are still prone to collapse although they were cooled before their fire resistance. Moreover, increasing the concrete cover thickness and the presence of plaster led to an increase in the maximum risk time. However, the variation in the live load ratio has almost no effect on such time.

  5. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    Science.gov (United States)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  6. Dose Rate Experiment at JET for Benchmarking the Calculation Direct One Step Method

    International Nuclear Information System (INIS)

    Angelone, M.; Petrizzi, L.; Pillon, M.; Villari, R.; Popovichev, S.

    2006-01-01

    Neutrons produced by D-D and D-T plasmas induce the activation of tokamak materials and of components. The development of reliable methods to assess dose rates is a key issue for maintenance and operating nuclear machines, in normal and off-normal conditions. In the frame of the EFDA Fusion Technology work programme, a computational tool based upon MCNP Monte Carlo code has been developed to predict the dose rate after shutdown: it is called Direct One Step Method (D1S). The D1S is an innovative approach in which the decay gammas are coupled to the neutrons as in the prompt case and they are transported in one single step in the same run. Benchmarking of this new tool with experimental data taken in a complex geometry like that of a tokamak is a fundamental step to test the reliability of the D1S method. A dedicated benchmark experiment was proposed for the 2005-2006 experimental campaign of JET. Two irradiation positions have been selected for the benchmark: one inner position inside the vessel, not far from the plasma, called the 2 upper irradiation end (IE2), where neutron fluence is relatively high. The second position is just outside a vertical port in an external position (EX). Here the neutron flux is lower and the dose rate to be measured is not very far from the residual background. Passive detectors are used for in-vessel measurements: the high sensitivity Thermo Luminescent Dosimeters (TLDs) GR-200A (natural LiF), which ensure measurements down to environmental dose level. An active detector of Geiger-Muller (GM) type is used for out of vessel dose rate measurement. Before their use the detectors were calibrated in a secondary gamma-ray standard (Cs-137 and Co-60) facility in term of air-kerma. The background measurement was carried-out in the period July -September 2005 in the outside position EX using the GM tube and in September 2005 inside the vacuum vessel using TLD detectors located in the 2 Upper irradiation end IE2. In the present work

  7. One Way Forward to Beat the Newtonian Habit with a Complexity Perspective on Organisational Change

    Directory of Open Access Journals (Sweden)

    Josie McLean

    2013-10-01

    Full Text Available We face a global crisis of un-sustainability—we need to change trajectory, but have so far displayed a collective inability to do so. This article suggests that one reason for this is our entrenched approach to change, which has inappropriately applied mechanistic Newtonian assumptions to “living” systems. Applying what has been learned about the behaviour of complex adaptive systems, we develop a pragmatic model for students of sustainability, who want to facilitate profound organizational and community change towards sustainability on the ground. Our model, “one way forward”, does not purport to be the only way but one possibility, grounded in a different understanding of the nature and dynamic of change as seen through the lens of complexity. In this way, it challenges more conventional change management practices. One way forward is a model facilitating evolutionary change in a social ecology—one possible expression of a “culture of community self-design” as expressed by Banathy. Its theoretical foundations and its practical application (it is designed for practice both have their source in a systemic view and in the principles that reflect the paradigm of complexity. Four central components of this new model—envisioning, core messages (values, indicators of progress, and experimentation—are explored in more detail.

  8. Resource cost results for one-way entanglement distillation and state merging of compound and arbitrarily varying quantum sources

    International Nuclear Information System (INIS)

    Boche, H.; Janßen, G.

    2014-01-01

    We consider one-way quantum state merging and entanglement distillation under compound and arbitrarily varying source models. Regarding quantum compound sources, where the source is memoryless, but the source state an unknown member of a certain set of density matrices, we continue investigations begun in the work of Bjelaković et al. [“Universal quantum state merging,” J. Math. Phys. 54, 032204 (2013)] and determine the classical as well as entanglement cost of state merging. We further investigate quantum state merging and entanglement distillation protocols for arbitrarily varying quantum sources (AVQS). In the AVQS model, the source state is assumed to vary in an arbitrary manner for each source output due to environmental fluctuations or adversarial manipulation. We determine the one-way entanglement distillation capacity for AVQS, where we invoke the famous robustification and elimination techniques introduced by Ahlswede. Regarding quantum state merging for AVQS we show by example that the robustification and elimination based approach generally leads to suboptimal entanglement as well as classical communication rates

  9. Backup key generation model for one-time password security protocol

    Science.gov (United States)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  10. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  11. One-sided measurement-device-independent quantum key distribution

    Science.gov (United States)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  12. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  13. Politics, Administration and Performance: A continuing search, but no one best way?

    NARCIS (Netherlands)

    Ch. Pollitt (Christopher)

    2012-01-01

    textabstractIntroduction: I have been tasked with the following question: how do relations between politics and administration shift when performance-improving reforms are introduced? As always, there is more than one way of interpreting the question, and of trying to answer. There are also strong

  14. One-way spatial integration of Navier-Stokes equations: stability of wall-bounded flows

    Science.gov (United States)

    Rigas, Georgios; Colonius, Tim; Towne, Aaron; Beyar, Michael

    2016-11-01

    For three-dimensional flows, questions of stability, receptivity, secondary flows, and coherent structures require the solution of large partial-derivative eigenvalue problems. Reduced-order approximations are thus required for engineering prediction since these problems are often computationally intractable or prohibitively expensive. For spatially slowly evolving flows, such as jets and boundary layers, a regularization of the equations of motion sometimes permits a fast spatial marching procedure that results in a huge reduction in computational cost. Recently, a novel one-way spatial marching algorithm has been developed by Towne & Colonius. The new method overcomes the principle flaw observed in Parabolized Stability Equations (PSE), namely the ad hoc regularization that removes upstream propagating modes. The one-way method correctly parabolizes the flow equations based on estimating, in a computationally efficient way, the local spectrum in each cross-stream plane and an efficient spectral filter eliminates modes with upstream group velocity. Results from the application of the method to wall-bounded flows will be presented and compared with predictions from the full linearized compressible Navier-Stokes equations and PSE.

  15. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  16. Can the one-way speed of light be used for detection of violations of the relativity principle?

    International Nuclear Information System (INIS)

    Spavieri, Gianfranco; Quintero, Jesús; Unnikrishnan, C.S.; Gillies, George T.; Cavalleri, Giancarlo; Tonni, Ernesto; Bosi, Leonardo

    2012-01-01

    Experimental attempts at measurement of the one-way speed of light are considered within the framework of relativistic theories. We show that if the effect of clock transport is taken into account, the observations from this class of experiment do not actually lead to either measurement of the one-way speed of light or determination of the absolute velocity of the preferred frame (even if, for non-entrained ether theories, such a frame were to exist). -- Highlights: ► We consider preferred frame theories that agree with experiments that support SR. ► Measurements of the one-way speed of light is discussed. ► The effect of clock transport is taken into account. ► These experiments do not lead to measurement of the one-way speed of light. ► The absolute velocity of the preferred frame cannot be detected.

  17. One-way versus two-way text messaging on improving medication adherence: meta-analysis of randomized trials.

    Science.gov (United States)

    Wald, David S; Butt, Shahena; Bestwick, Jonathan P

    2015-10-01

    Mobile telephone text messaging is a simple potential solution to the failure to take medications as directed. There is uncertainty over the effectiveness of 1-way text messaging (sending text message reminders only) compared with 2-way text messaging (sending reminders and receiving replies confirming whether medication has been taken) as a means of improving medication adherence. A meta-analysis of 8 randomized trials (1994 patients) that tested the effectiveness of text messaging on medication adherence was performed. The trials were divided into 2 groups: trials using 1-way text messaging versus no text messaging and trials using 2-way text messaging versus no text messaging. The summary estimates of the effect of the 2 methods of text messaging (1-way or 2-way) were compared. The summary relative risk estimate was 1.04 (95% confidence interval, 0.97-1.11) for 1-way text messaging and 1.23 (95% confidence interval, 1.13-1.35) for 2-way text messaging. The difference in effect between the 2 methods was statistically significant (P = .007). Two-way text messaging is associated with substantially improved medication adherence compared with 1-way text messaging. This has important implications in the provision of mobile-based messaging in the management of patients taking medication for the prevention of chronic disease. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  19. On achievable rate of two-way relaying cognitive radio with space alignment

    KAUST Repository

    Sboui, Lokman

    2015-09-11

    We study a multiple-antenna two-way relaying (TWR) spectrum sharing system. A space alignment (SA) technique is adopted by the secondary users (SU\\'s) to avoid interference with the primary users (PU\\'s). We derive the optimal power allocation that maximizes the TWR achievable sum-rate of the SU while respecting the total power budget and the relay power constraints. In the numerical results, we quantify the sum-rate gain of using the SA in the TWR CR and we show that the SU sum-rate is very limited when the relay power is low or the PU\\'s power and its resulting interference is high. © 2015 IEEE.

  20. Rate Optimization of Two-Way Relaying with Wireless Information and Power Transfer

    Directory of Open Access Journals (Sweden)

    Thinh Phu Do

    2017-11-01

    Full Text Available We consider the simultaneous wireless information and power transfer in two-phase decode-and-forward two-way relaying networks, where a relay harvests the energy from the signal to be relayed through either power splitting or time splitting. Here, we formulate the resource allocation problems optimizing the time-phase and signal splitting ratios to maximize the sum rate of the two communicating devices. The joint optimization problems are shown to be convex for both the power splitting and time splitting approaches after some transformation if required to be solvable with an existing solver. To lower the computational complexity, we also present the suboptimal methods optimizing the splitting ratio for the fixed time-phase and derive a closed-form solution for the suboptimal method based on the power splitting. The results demonstrate that the power splitting approaches outperform their time splitting counterparts and the suboptimal power splitting approach provides a performance close to the optimal one while reducing the complexity significantly.

  1. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  2. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  3. Assessing Fan Flutter Stability in Presence of Inlet Distortion Using One-Way and Two-Way Coupled Methods

    Science.gov (United States)

    Herrick, Gregory P.

    2014-01-01

    Concerns regarding noise, propulsive efficiency, and fuel burn are inspiring aircraft designs wherein the propulsive turbomachines are partially (or fully) embedded within the airframe; such designs present serious concerns with regard to aerodynamic and aeromechanic performance of the compression system in response to inlet distortion. Previously, a preliminary design of a forward-swept high-speed fan exhibited flutter concerns in clean-inlet flows, and the present author then studied this fan further in the presence of off-design distorted in-flows. Continuing this research, a three-dimensional, unsteady, Navier-Stokes computational fluid dynamics code is again applied to analyze and corroborate fan performance with clean inlet flow and now with a simplified, sinusoidal distortion of total pressure at the aerodynamic interface plane. This code, already validated in its application to assess aerodynamic damping of vibrating blades at various flow conditions using a one-way coupled energy-exchange approach, is modified to include a two-way coupled timemarching aeroelastic simulation capability. The two coupling methods are compared in their evaluation of flutter stability in the presence of distorted in-flows.

  4. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  5. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  6. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  7. The performance of one belt and one road exchange rate: Based on improved singular spectrum analysis

    Science.gov (United States)

    Lai, Lin; Guo, Kun

    2017-10-01

    ;One Belt and One Road; strategy in China is on push of foreign trade openness at northwest, southwest and northeast, absorption of the excess capacity and new support for economic increase. However, the fluctuation in RMB exchange rate with the countries along the road is unstable so related Chinese enterprises will face high risk of exchange rate. Precise explanation or prediction for exchange rate has been the challengeable hop point in the international finance. This paper decomposed the One Belt One Road Exchange Rate Index (OBORR) and the RMB Effective Exchange Rate Index (CNYX) into trend term, market fluctuation term and noise term using improved singular spectrum analysis (SSA). It turns out that the increasing velocity of OBORR is greater than that of CNYX in the long term, and there is dynamic lead-lag structure in the medium term. In the short term, the fluctuation range and frequency of OBORR are greater than those of CNYX, which means there will be more exchange rate risks in One Belt and One Road countries.

  8. Pregnancy Rates After Compulsatory One and Conditional Two Embriyo Transfer

    Directory of Open Access Journals (Sweden)

    Seyhan Gümüşlü

    2013-06-01

    Full Text Available Objective: To predict our pregnancy rates after compulsatory one and conditional two embriyo transfer (ET number. Design: Retrospective Analysis Materiyal and Methods: One or two embryo transferred 362 patient were analyzed between March 2010 and September 2011. Results: Our clinical pregnancy rate was 31% and implantation rate was 25%. Our pregnancy rates after one or two ET were 30 and 32 % respectively ( P>0.05. We transferred embryos at second, third day or blastocyst stage. Pregnancy rates were 19, 30 and 48 % respectively (p< 0.001, implantation rates were 14.5, 23.5 and 42.4 % respectively ( P< 0.001. Our freezing rate was 39.5 %. Not to have freezing quality embrios or to have increased the the pregnancy rate from 21% to %45 significantly. When one embriyo transfered 95 % single and 5 % twins observed. When two embryos were transfered 81% single,17% twin and 2 % triplets observed. Conclusion: Pregnancy rates for one or two ET were statistically similar. If embryo quality allows us to culture up to blastocyt stage pregnancy rates were statistically increased. New Turkish ET policy resulted 95 % to 81 % single gestational sacs according to 1 or 2 ET at Gazi University IVF center.

  9. 'The ones that turn up are the ones that are responsible': Key stakeholders perspectives on liquor accords.

    Science.gov (United States)

    Curtis, Ashlee; Miller, Peter; Droste, Nicolas; McFarlane, Emma; Martino, Florentine; Palmer, Darren

    2016-05-01

    Liquor accords were introduced as an intervention to reduce alcohol-related harm in and around licensed venues. There have been very few evaluations of the accords, made all the more difficult given the multitude of measures that are often implemented under their banner. This study provides perspectives on the effectiveness of the liquor accords from key stakeholders who were involved in the strategy. In-depth interviews were conducted with 97 key stakeholders as part of a larger study, of which 46 spoke about the effectiveness of liquor accords. Responses were analysed using thematic analysis. Stakeholders reported the greatest benefit of liquor accords to be their ability to improve communication. Many stakeholders recognised the need for mandatory attendance and discussed whether the accords are a waste of time of resources. Stakeholders did not generally view liquor accords as effective means of reducing alcohol-related harm. There was a lack of positive feedback about liquor accords provided by stakeholders, indicating a clear need to better understand the role of liquor accords, and what they aim to achieve. Responsive regulation theory suggests that the dual roles of communication and intervention are confused, leading to some of the inherent problems with accords. The role and aims of liquor accords need to be clearly defined. The findings suggest that separating the communication and regulatory functions from accords will lead to a clearer role for accords, and interventions and regulation might be better placed in the hands of regulators and enforcement. [Curtis A, Miller P, Droste N, McFarlane E, Martino F, Palmer D. 'The ones that turn up are the ones that are responsible': Key stakeholders perspectives on liquor accords. Drug Alcohol Rev 2016;35:273-279]. © 2016 Australasian Professional Society on Alcohol and other Drugs.

  10. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  11. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  12. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  13. Ants can learn to forage on one-way trails.

    Directory of Open Access Journals (Sweden)

    Pedro Leite Ribeiro

    Full Text Available The trails formed by many ant species between nest and food source are two-way roads on which outgoing and returning workers meet and touch each other all along. The way to get back home, after grasping a food load, is to take the same route on which they have arrived from the nest. In many species such trails are chemically marked by pheromones providing orientation cues for the ants to find their way. Other species rely on their vision and use landmarks as cues. We have developed a method to stop foraging ants from shuttling on two-way trails. The only way to forage is to take two separate roads, as they cannot go back on their steps after arriving at the food or at the nest. The condition qualifies as a problem because all their orientation cues -- chemical, visual or any other -- are disrupted, as all of them cannot but lead the ants back to the route on which they arrived. We have found that workers of the leaf-cutting ant Atta sexdens rubropilosa can solve the problem. They could not only find the alternative way, but also used the unidirectional traffic system to forage effectively. We suggest that their ability is an evolutionary consequence of the need to deal with environmental irregularities that cannot be negotiated by means of excessively stereotyped behavior, and that it is but an example of a widespread phenomenon. We also suggest that our method can be adapted to other species, invertebrate and vertebrate, in the study of orientation, memory, perception, learning and communication.

  14. One-Way Nested Large-Eddy Simulation over the Askervein Hill

    Directory of Open Access Journals (Sweden)

    James D. Doyle

    2009-07-01

    Full Text Available Large-eddy simulation (LES models have been used extensively to study atmospheric boundary layer turbulence over flat surfaces; however, LES applications over topography are less common. We evaluate the ability of an existing model – COAMPS®-LES – to simulate flow over terrain using data from the Askervein Hill Project. A new approach is suggested for the treatment of the lateral boundaries using one-way grid nesting. LES wind profile and speed-up are compared with observations at various locations around the hill. The COAMPS-LES model performs generally well. This case could serve as a useful benchmark for evaluating LES models for applications over topography.

  15. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  16. Acoustic topological insulator and robust one-way sound transport

    Science.gov (United States)

    He, Cheng; Ni, Xu; Ge, Hao; Sun, Xiao-Chen; Chen, Yan-Bin; Lu, Ming-Hui; Liu, Xiao-Ping; Chen, Yan-Feng

    2016-12-01

    Topological design of materials enables topological symmetries and facilitates unique backscattering-immune wave transport. In airborne acoustics, however, the intrinsic longitudinal nature of sound polarization makes the use of the conventional spin-orbital interaction mechanism impossible for achieving band inversion. The topological gauge flux is then typically introduced with a moving background in theoretical models. Its practical implementation is a serious challenge, though, due to inherent dynamic instabilities and noise. Here we realize the inversion of acoustic energy bands at a double Dirac cone and provide an experimental demonstration of an acoustic topological insulator. By manipulating the hopping interaction of neighbouring ’atoms’ in this new topological material, we successfully demonstrate the acoustic quantum spin Hall effect, characterized by robust pseudospin-dependent one-way edge sound transport. Our results are promising for the exploration of new routes for experimentally studying topological phenomena and related applications, for example, sound-noise reduction.

  17. Cogeneration: One way to use biomass efficiently

    International Nuclear Information System (INIS)

    Gustavsson, L.; Johansson, B.

    1993-01-01

    Cogeneration in district heating systems is the most energy-efficient way to convert biomass into heat and electricity with current or nearly commercial technologies. Methanol produced from biomass and used in vehicles instead of petrol or diesel could reduce carbon dioxide emissions nearly as much per unit of biomass as if the biomass were used to replace natural gas for cogeneration, but at some higher cost per unit of carbon dioxide reduction. The most energy-efficient way to use biomass for cogeneration appears to be combined cycle technology, and the world's first demonstration plant is now being built. Potentially, this technology can be used for electricity production in Swedish district heating systems to provide nearly 20% of current Swedish electricity production, while simultaneously reducing carbon dioxide emissions from the district heating systems by some 55%. The heat costs from cogeneration with biomass are higher than the heat costs from fossil fuel plants at current fuel prices. Biomass can only compete with fossil fuel if other advantages, for example a lower environmental impact are considered. (au) (35 refs.)

  18. A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT and Key Coloumnar Transposition (KCT Method

    Directory of Open Access Journals (Sweden)

    Pryo Utomo

    2017-06-01

    Full Text Available One Time Pad (OTP is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext will be generated more difficult to be known. In the Key and Plaintext Insertion (KPI Method, we modify the OTP algorithm by adding the key insertion in the plaintext that has been splitted. Meanwhile in the Key Coloumnar Transposition (KCT Method, we modify the OTP algorithm by dividing the key into some parts in matrix of rows and coloumns. Implementation of the algorithms using PHP programming language.

  19. The Laguerre finite difference one-way equation solver

    Science.gov (United States)

    Terekhov, Andrew V.

    2017-05-01

    This paper presents a new finite difference algorithm for solving the 2D one-way wave equation with a preliminary approximation of a pseudo-differential operator by a system of partial differential equations. As opposed to the existing approaches, the integral Laguerre transform instead of Fourier transform is used. After carrying out the approximation of spatial variables it is possible to obtain systems of linear algebraic equations with better computing properties and to reduce computer costs for their solution. High accuracy of calculations is attained at the expense of employing finite difference approximations of higher accuracy order that are based on the dispersion-relationship-preserving method and the Richardson extrapolation in the downward continuation direction. The numerical experiments have verified that as compared to the spectral difference method based on Fourier transform, the new algorithm allows one to calculate wave fields with a higher degree of accuracy and a lower level of numerical noise and artifacts including those for non-smooth velocity models. In the context of solving the geophysical problem the post-stack migration for velocity models of the types Syncline and Sigsbee2A has been carried out. It is shown that the images obtained contain lesser noise and are considerably better focused as compared to those obtained by the known Fourier Finite Difference and Phase-Shift Plus Interpolation methods. There is an opinion that purely finite difference approaches do not allow carrying out the seismic migration procedure with sufficient accuracy, however the results obtained disprove this statement. For the supercomputer implementation it is proposed to use the parallel dichotomy algorithm when solving systems of linear algebraic equations with block-tridiagonal matrices.

  20. Seismic Imaging, One-Way Wave Equations, Pseudodifferential Operators, Path Integrals, and all that Jazz

    Science.gov (United States)

    Artoun, Ojenie; David-Rus, Diana; Emmett, Matthew; Fishman, Lou; Fital, Sandra; Hogan, Chad; Lim, Jisun; Lushi, Enkeleida; Marinov, Vesselin

    2006-05-01

    In this report we summarize an extension of Fourier analysis for the solution of the wave equation with a non-constant coefficient corresponding to an inhomogeneous medium. The underlying physics of the problem is exploited to link pseudodifferential operators and phase space path integrals to obtain a marching algorithm that incorporates the backward scattering into the evolution of the wave. This allows us to successfully apply single-sweep, one-way marching methods in inherently two-way environments, which was not achieved before through other methods for this problem.

  1. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  2. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  3. A Hybrid One-Way ANOVA Approach for the Robust and Efficient Estimation of Differential Gene Expression with Multiple Patterns.

    Directory of Open Access Journals (Sweden)

    Mohammad Manir Hossain Mollah

    Full Text Available Identifying genes that are differentially expressed (DE between two or more conditions with multiple patterns of expression is one of the primary objectives of gene expression data analysis. Several statistical approaches, including one-way analysis of variance (ANOVA, are used to identify DE genes. However, most of these methods provide misleading results for two or more conditions with multiple patterns of expression in the presence of outlying genes. In this paper, an attempt is made to develop a hybrid one-way ANOVA approach that unifies the robustness and efficiency of estimation using the minimum β-divergence method to overcome some problems that arise in the existing robust methods for both small- and large-sample cases with multiple patterns of expression.The proposed method relies on a β-weight function, which produces values between 0 and 1. The β-weight function with β = 0.2 is used as a measure of outlier detection. It assigns smaller weights (≥ 0 to outlying expressions and larger weights (≤ 1 to typical expressions. The distribution of the β-weights is used to calculate the cut-off point, which is compared to the observed β-weight of an expression to determine whether that gene expression is an outlier. This weight function plays a key role in unifying the robustness and efficiency of estimation in one-way ANOVA.Analyses of simulated gene expression profiles revealed that all eight methods (ANOVA, SAM, LIMMA, EBarrays, eLNN, KW, robust BetaEB and proposed perform almost identically for m = 2 conditions in the absence of outliers. However, the robust BetaEB method and the proposed method exhibited considerably better performance than the other six methods in the presence of outliers. In this case, the BetaEB method exhibited slightly better performance than the proposed method for the small-sample cases, but the the proposed method exhibited much better performance than the BetaEB method for both the small- and large

  4. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  5. Security by quantum key distribution and IPSEC (SEQKEIP): feasibility

    International Nuclear Information System (INIS)

    Sfaxi, M.A.; Ghernaouti-Helie, S.; Ribordy, G; Gay, O.

    2005-01-01

    Full text: Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. On the contrary, quantum cryptography is a method for sharing secret keys, whose security can be formally demonstrated. It is based on the laws of physics. The possible applications of quantum cryptography are mainly linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols. One of the possible use of quantum cryptography is within IPSEC. The aim of this paper is to analyse the feasibility of using quantum cryptography in IPSEC and to present the estimated performances of this solution. (author)

  6. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators.

    Science.gov (United States)

    Ni, Xiang; Purtseladze, David; Smirnova, Daria A; Slobozhanyuk, Alexey; Alù, Andrea; Khanikaev, Alexander B

    2018-05-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage ( 1 - 3 ). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light ( 4 - 6 ). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom.

  7. Tempo of Diversification of Global Amphibians: One-Constant Rate, One-Continuous Shift or Multiple-Discrete Shifts?

    OpenAIRE

    Youhua Chen

    2014-01-01

    In this brief report, alternative time-varying diversification rate models were fitted onto the phylogeny of global amphibians by considering one-constant-rate (OCR), one-continuous-shift (OCS) and multiplediscrete- shifts (MDS) situations. The OCS diversification model was rejected by γ statistic (γ=-5.556, p⁄ 0.001), implying the existence of shifting diversification rates for global amphibian phylogeny. Through model selection, MDS diversification model outperformed OCS and OCR...

  8. Mitigation of Control Channel Jamming via Combinatorial Key Distribution

    Science.gov (United States)

    Falahati, Abolfazl; Azarafrooz, Mahdi

    The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.

  9. Protect the Ones You Love: Burns Safety

    Science.gov (United States)

    ... Submit Search The CDC Protect the Ones You Love: Child Injuries are Preventable Note: Javascript is disabled ... ways you can help protect the children you love from burns. Key Prevention Tips To prevent burns ...

  10. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  11. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  12. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators

    Science.gov (United States)

    Slobozhanyuk, Alexey

    2018-01-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage (1–3). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light (4–6). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom. PMID:29756032

  13. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  14. structural behavior of fibrous reinforced concrete hollowcore one-way slabs strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    wassif khudair majeed

    2016-02-01

    Full Text Available Abstract A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self weight of the construction . The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs  reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRP This study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers ( , and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to ( 96.2% , as has been observed decrease in deflection value of models after strengthening by (CFRP. It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP .

  15. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  16. Key Performance Indicators in the Evaluation of the Quality of Radiation Safety Programs.

    Science.gov (United States)

    Schultz, Cheryl Culver; Shaffer, Sheila; Fink-Bennett, Darlene; Winokur, Kay

    2016-08-01

    Beaumont is a multiple hospital health care system with a centralized radiation safety department. The health system operates under a broad scope Nuclear Regulatory Commission license but also maintains several other limited use NRC licenses in off-site facilities and clinics. The hospital-based program is expansive including diagnostic radiology and nuclear medicine (molecular imaging), interventional radiology, a comprehensive cardiovascular program, multiple forms of radiation therapy (low dose rate brachytherapy, high dose rate brachytherapy, external beam radiotherapy, and gamma knife), and the Research Institute (including basic bench top, human and animal). Each year, in the annual report, data is analyzed and then tracked and trended. While any summary report will, by nature, include items such as the number of pieces of equipment, inspections performed, staff monitored and educated and other similar parameters, not all include an objective review of the quality and effectiveness of the program. Through objective numerical data Beaumont adopted seven key performance indicators. The assertion made is that key performance indicators can be used to establish benchmarks for evaluation and comparison of the effectiveness and quality of radiation safety programs. Based on over a decade of data collection, and adoption of key performance indicators, this paper demonstrates one way to establish objective benchmarking for radiation safety programs in the health care environment.

  17. No-signaling quantum key distribution: solution by linear programming

    Science.gov (United States)

    Hwang, Won-Young; Bae, Joonwoo; Killoran, Nathan

    2015-02-01

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csiszár-Körner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  18. An adaptation method to improve secret key rates of time-frequency QKD in atmospheric turbulence channels

    Science.gov (United States)

    Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.

    2016-03-01

    Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.

  19. General immunity and superadditivity of two-way Gaussian quantum cryptography.

    Science.gov (United States)

    Ottaviani, Carlo; Pirandola, Stefano

    2016-03-01

    We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.

  20. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  1. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  2. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  3. Balance in Representation - More Than One Way to Tip the Scales

    Science.gov (United States)

    Rowell, D. S.; Carlis, D. L.

    2017-12-01

    Too often diversity balance is seen as purely a numbers issue - one of influx and totals. And thus recruiting and retention being two sides of the same valuable coin. However, balance is not just numbers. There is more than one means to add diversity value to an organization. Numbers is one, but power is another. `Balance' is also reached through empowerment and voice. Whereas recruiting and retention can be seen as hard currency buying balanced demographics, empowerment is an investment that takes various forms and yields various dividends. Empowerment includes investment in people, and training, and systems, and pays dividends in performance, and voice, and careers, and service. In this way space is created for the benefits of diversity even where numbers and composition is statically unyielding. Equilibrium comes from tipping the scales with involvement, impact and affect. And finally in coming back full circle, empowerment has a bonus direct effect on the numbers, as it does improve diverse recruiting and retention. This presentation places a focus on balance in terms of gender efficacy. It will highlight the requirements to grow and mature gender empowerment investments and show how these investments have diversity dividends. And finally the presentation will note how NWS is taking a multi-faceted approach to diversity to achieve `balance' through empowerment, involvement, (gender) mainstreaming, training, etc…, and of course recruiting and retention.

  4. Science Teaching Experiences in Informal Settings: One Way to Enrich the Preparation Program for Preservice Science Teachers

    Science.gov (United States)

    Hsu, Pei-Ling

    2016-01-01

    The high attrition rate of new science teachers demonstrates the urgent need to incorporate effective practices in teacher preparation programs to better equip preservice science teachers. The purpose of the study is to demonstrate a way to enrich preservice science teachers' preparation by incorporating informal science teaching practice into…

  5. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptographic functions such as Advanced Encryption Standard ( AES ) [5] to produce keywraps to orchestrate key exchanges between groups of devices. These...Storage (MPMS). This is done for two reasons: first, the mission package is encrypted using AES keywrap mode with the CEK [7], which is a special version...Zone 1) denoting ephemeral secrets such as dynamic keys. AES encryption is employed as a one-way function leading from the ephemeral Zone 1 to the

  6. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  7. An experiment to measure the one-way velocity of propagation of electromagnetic radiation

    Science.gov (United States)

    Kolen, P.; Torr, D. G.

    1982-01-01

    An experiment involving commercially available instrumentation to measure the velocity of the earth with respect to absolute space is described. The experiment involves the measurement of the one-way propagation velocity of electromagnetic radiation down a high-quality coaxial cable. It is demonstrated that the experiment is both physically meaningful and exceedingly simple in concept and in implementation. It is shown that with currently available commercial equipment one might expect to detect a threshold value for the component of velocity of the earth's motion with respect to absolute space in the equatorial plane of approximately 10 km/s, which greatly exceeds the velocity resolution required to detect the motion of the solar system with respect to the center of the galaxy.

  8. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  9. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  10. Effective Outpatient Care in the Community: One German Way ...

    African Journals Online (AJOL)

    indicators of the chronicity and severity of psychiatric disorder, the psychiatric first diagnosis, the age of onset of disease and duration since onset of disease) at the first ... Key Words: Community Psychiatry, German Model, Effectiveness.

  11. Deprivation index and dependency ratio are key determinants of emergency medical admission rates.

    Science.gov (United States)

    Conway, Richard; Byrne, Declan; O'Riordan, Deirdre; Cournane, Seán; Coveney, Seamus; Silke, Bernard

    2015-11-01

    Patients from deprived backgrounds have a higher in-patient mortality following an emergency medical admission; there has been debate as to the extent to which deprivation and population structure influences hospital admission rate. All emergency medical admissions to an Irish hospital over a 12-year period (2002-2013) categorized by quintile of Deprivation Index and Dependency Ratio (proportion of population Dependency Ratio was an independent predictor of the admission rate with adjusted predicted rates of Q1 20.8 (95%CI 20.5 to 21.1), Q2 19.2 (95%CI 19.0 to 19.4), Q3 27.6 (95%CI 27.3 to 27.9), Q4 43.9 (95%CI 43.5 to 44.4) and Q5 34.4 (95%CI 34.1 to 34.7). A high concurrent Deprivation Index and Dependency Ratio were associated with very high admission rates. Deprivation Index and population Dependency Ratio are key determinants of the rate of emergency medical admissions. Copyright © 2015 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  12. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  13. Structural Behavior of Fibrous Reinforced Concrete Hollow Core One-Way Slabs Strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    وصيف مجيد

    2016-02-01

    Full Text Available A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self-weight of the construction. The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRPThis study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers (ا, and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to (96.2%, as has been observed decrease in deflection value of models after strengthening by (CFRP.It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP.

  14. Tempo of Diversification of Global Amphibians: One-Constant Rate, One-Continuous Shift or Multiple-Discrete Shifts?

    Directory of Open Access Journals (Sweden)

    Youhua Chen

    2014-01-01

    Full Text Available In this brief report, alternative time-varying diversification rate models were fitted onto the phylogeny of global amphibians by considering one-constant-rate (OCR, one-continuous-shift (OCS and multiplediscrete- shifts (MDS situations. The OCS diversification model was rejected by γ statistic (γ=-5.556, p⁄ 0.001, implying the existence of shifting diversification rates for global amphibian phylogeny. Through model selection, MDS diversification model outperformed OCS and OCR models using “laser” package under R environment. Moreover, MDS models, implemented using another R package “MEDUSA”, indicated that there were sixteen shifts over the internal nodes for amphibian phylogeny. Conclusively, both OCS and MDS models are recommended to compare so as to better quantify rate-shifting trends of species diversification. MDS diversification models should be preferential for large phylogenies using “MEDUSA” package in which any arbitrary numbers of shifts are allowed to model.

  15. Pseudospin Dependent One-Way Transmission in Graphene-Based Topological Plasmonic Crystals

    Science.gov (United States)

    Qiu, Pingping; Qiu, Weibin; Ren, Junbo; Lin, Zhili; Wang, Zeyu; Wang, Jia-Xian; Kan, Qiang; Pan, Jiao-Qing

    2018-04-01

    Originating from the investigation of condensed matter states, the concept of quantum Hall effect and quantum spin Hall effect (QSHE) has recently been expanded to other field of physics and engineering, e.g., photonics and phononics, giving rise to strikingly unconventional edge modes immune to scattering. Here, we present the plasmonic analog of QSHE in graphene plasmonic crystal (GPC) in mid-infrared frequencies. The band inversion occurs when deforming the honeycomb lattice GPCs, which further leads to the topological band gaps and pseudospin features of the edge states. By overlapping the band gaps with different topologies, we numerically simulated the pseudospin-dependent one-way propagation of edge states. The designed GPC may find potential applications in the fields of topological plasmonics and trigger the exploration of the technique of the pseudospin multiplexing in high-density nanophotonic integrated circuits.

  16. Self-biased broadband magnet-free linear isolator based on one-way space-time coherency

    Science.gov (United States)

    Taravati, Sajjad

    2017-12-01

    This paper introduces a self-biased broadband magnet-free and linear isolator based on one-way space-time coherency. The incident wave and the space-time-modulated medium share the same temporal frequency and are hence temporally coherent. However, thanks to the unidirectionally of the space-time modulation, the space-time-modulated medium and the incident wave are spatially coherent only in the forward direction and not in the opposite direction. As a consequence, the energy of the medium strongly couples to the propagating wave in the forward direction, while it conflicts with the propagating wave in the opposite direction, yielding strong isolation. We first derive a closed-form solution for the wave scattering from a spatiotemporally coherent medium and then show that a perfectly coherent space-time-modulated medium provides a moderate isolation level which is also subject to one-way transmission gain. To overcome this issue, we next investigate the effect of space-coherency imperfection between the medium and the wave, while they are still perfectly temporally coherent. Leveraging the spatial-coherency imperfection, the medium exhibits a quasiarbitrary and strong nonreciprocal transmission. Finally, we present the experimental demonstration of the self-biased version of the proposed broadband isolator, exhibiting more than 122 % fractional operation bandwidth.

  17. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  18. ONE OF THE POSSIBLE WAYS TO STRENGTHENING THE SECURITY

    Directory of Open Access Journals (Sweden)

    Roman URBAN

    2016-09-01

    Full Text Available The paper is intended to point out at the relation between security and its key vehicle that is humans themselves. It presents an option to strengthen security through purposeful education of peiple and their comprehensive training in peaceful settlement of conflicts.

  19. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  20. Neutrino energy loss rates due to key iron isotopes for core-collapse physics

    International Nuclear Information System (INIS)

    Nabi, J.-U.

    2008-07-01

    Accurate estimates of neutrino energy loss rates are needed for the study of the late stages of the stellar evolution, in particular for the cooling of neutron stars and white dwarfs. The energy spectra of neutrinos and antineutrinos arriving at the Earth can also provide useful information on the primary neutrino fluxes as well as neutrino mixing scenario. Proton-neutron quasi-particle random phase approximation (pn-QRPA) theory has recently being used for a microscopic calculation of stellar weak interaction rates of fp-shell nuclide, particularly iron isotopes, with success. Here I present the calculation of neutrino and antineutrino energy loss rates due to key iron isotopes in stellar matter using the pn-QRPA theory. The rates are calculated on a fine grid of temperature-density scale suitable for core-collapse simulators. The calculated rates are compared against earlier calculations. The neutrino cooling rates due to even-even isotopes of iron, 54,56 Fe, are in good agreement with the rates calculated using the large-scale shell model. The pn-QRPA calculated neutrino energy loss rates due to 55 Fe are enhanced roughly around an order of magnitude compared to the large-scale shell model calculation during the oxygen and silicon shell burning stages of massive stars and favor a lower entropy for the cores of massive stars. (author)

  1. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  2. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

    Directory of Open Access Journals (Sweden)

    Rameez Asif

    2017-01-01

    Full Text Available There is current significant interest in Fiber-to-the-Home (FTTH networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD. However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using off-the-shelf telecommunication components to enable high performance Continuous Variable-Quantum Key Distribution (CV-QKD systems that can yield secure key rates in the range of 100 Mbits/s under practical operating conditions. Multilevel phase modulated signals (m-PSK are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed Quantum-to-the-Home (QTTH network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available high-cost encryption modules.

  3. Continuous-variable quantum key distribution in uniform fast-fading channels

    Science.gov (United States)

    Papanastasiou, Panagiotis; Weedbrook, Christian; Pirandola, Stefano

    2018-03-01

    We investigate the performance of several continuous-variable quantum key distribution protocols in the presence of uniform fading channels. These are lossy channels whose transmissivity changes according to a uniform probability distribution. We assume the worst-case scenario where an eavesdropper induces a fast-fading process, where she chooses the instantaneous transmissivity while the remote parties may only detect the mean statistical effect. We analyze coherent-state protocols in various configurations, including the one-way switching protocol in reverse reconciliation, the measurement-device-independent protocol in the symmetric configuration, and its extension to a three-party network. We show that, regardless of the advantage given to the eavesdropper (control of the fading), these protocols can still achieve high rates under realistic attacks, within reasonable values for the variance of the probability distribution associated with the fading process.

  4. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  5. Single blastocyst transfer: The key to reduce multiple pregnancy rates without compromising the live birth rate

    Directory of Open Access Journals (Sweden)

    Uma M Sundhararaj

    2017-01-01

    Full Text Available Background: Historically, to achieve higher pregnancy rates, multiple embryos were transferred after an in-vitro fertilisation (IVF. However, this practice is being reassessed, because it leads to multiple pregnancies that is known to cause adverse maternal and fetal outcomes. Aim: To compare the pregnancy outcomes in fresh IVF or intracytoplasmic sperm injection (ICSI cycles among women undergoing elective single blastocyst transfer (eSBT vs. those undergoing double blastocyst transfer (DBT. Settings and Design: It is a retrospective data analysis of 582 patients undergoing fresh IVF/ICSI cycles performed from January 2012 to June 2015. Materials and Methods: Patients, who underwent IVF/ICSI and developed more than one blastocyst, were included in the study. Donor cycles were excluded from the study. All the embryos were cultured to blastocyst stage in sequential media followed by transfer of two blastocysts (DBT or eSBT and cryopreservation of the remaining. Statistical Analysis: Statistical analysis was performed using chi square test. Results: Out of 582 patients, in 149 patients one blastocyst was transferred and in 433 patients two blastocysts were transferred. There was no statistical difference in the biochemical pregnancy rate, clinical pregnancy rate and live birth rate in both the groups. Statistics demonstrated a significant drop in miscarriage rate in eSBT group. There was no incidence of twins in eSBT group, whereas twin birth rate per clinical pregnancy was 29.02% in DBT group. Conclusion: Single blastocyst transfer is an effective method to reduce the risk of multiple births without compromising the pregnancy outcomes. Given the promising potential of vitrification; the remaining blastocyst can be cryopreserved.

  6. Counting dementia: There is no one "best" way.

    Science.gov (United States)

    Launer, Lenore J

    2011-01-01

    The growing societal and individual burden of dementia means that counting the cases of dementia is critical. There are several approaches and methods that can be used to identify dementia cases. The ascertainment can range from very detailed characterization of the individual (deep) to a brief standardized assessment (wide) that emphasizes individual functioning. The choice of going deep or wide depends on the goal of the ascertainment. These goals are discussed, as well as the emerging issues that may change the way dementia cases are classified. Published by Elsevier Inc.

  7. Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution

    CERN Document Server

    Tamaki, K

    2005-01-01

    In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in "SARG04 protocol" proposed by V. Scarani et al, in Phys. Rev. Lett. 92, 057901 (2004). This protocol differs from BB84 only in the classical communication. It is, thus, interesting to see how only the classical communication of QKD protocol might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.

  8. Diversity of key players in the microbial ecosystems of the human body.

    Science.gov (United States)

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  9. Quantum key distribution using continuous-variable non-Gaussian states

    Science.gov (United States)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  10. Heteroscedastic Tests Statistics for One-Way Analysis of Variance: The Trimmed Means and Hall's Transformation Conjunction

    Science.gov (United States)

    Luh, Wei-Ming; Guo, Jiin-Huarng

    2005-01-01

    To deal with nonnormal and heterogeneous data for the one-way fixed effect analysis of variance model, the authors adopted a trimmed means method in conjunction with Hall's invertible transformation into a heteroscedastic test statistic (Alexander-Govern test or Welch test). The results of simulation experiments showed that the proposed technique…

  11. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    DEFF Research Database (Denmark)

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  12. Two-way DF relaying assisted D2D communication: ergodic rate and power allocation

    Science.gov (United States)

    Ni, Yiyang; Wang, Yuxi; Jin, Shi; Wong, Kai-Kit; Zhu, Hongbo

    2017-12-01

    In this paper, we investigate the ergodic rate for a device-to-device (D2D) communication system aided by a two-way decode-and-forward (DF) relay node. We first derive closed-form expressions for the ergodic rate of the D2D link under asymmetric and symmetric cases, respectively. We subsequently discuss two special scenarios including weak interference case and high signal-to-noise ratio case. Then we derive the tight approximations for each of the considered scenarios. Assuming that each transmitter only has access to its own statistical channel state information (CSI), we further derive closed-form power allocation strategy to improve the system performance according to the analytical results of the ergodic rate. Furthermore, some insights are provided for the power allocation strategy based on the analytical results. The strategies are easy to compute and require to know only the channel statistics. Numerical results show the accuracy of the analysis results under various conditions and test the availability of the power allocation strategy.

  13. Four-Way Relaying in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Liu, Huaping; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    Two-way relaying in wireless systems has initiated a large research effort during the past few years. Nevertheless, it represents only a specific traffic pattern and it is of interest to investigate other traffic patterns where such a simultaneous processing of information flows can bring...... performance advantage. In this paper we consider a \\emph{four-way relaying} scenario, where each of the two Mobile Stations (MSs) has a two-way connection to the same Base Station (BS), while each connection is through a dedicated Relay Station (RS). The RSs are placed in such a way that one RS...... of the new scheme for Decode-and-Forward (DF) operational model for the RS. We compare the performance with a state-of-the-art reference scheme, based on two-way relaying with DF. The results indicate that the achievable rate regions are significantly enlarged for the new scheme....

  14. One-way propagation of bulk states and robust edge states in photonic crystals with broken inversion and time-reversal symmetries

    Science.gov (United States)

    Lu, Jin-Cheng; Chen, Xiao-Dong; Deng, Wei-Min; Chen, Min; Dong, Jian-Wen

    2018-07-01

    The valley is a flexible degree of freedom for light manipulation in photonic systems. In this work, we introduce the valley concept in magnetic photonic crystals with broken inversion symmetry. One-way propagation of bulk states is demonstrated by exploiting the pseudo-gap where bulk states only exist at one single valley. In addition, the transition between Hall and valley-Hall nontrivial topological phases is also studied in terms of the competition between the broken inversion and time-reversal symmetries. At the photonic boundary between two topologically distinct photonic crystals, we illustrate the one-way propagation of edge states and demonstrate their robustness against defects.

  15. Tomographic Approach in Three-Orthogonal-Basis Quantum Key Distribution

    International Nuclear Information System (INIS)

    Liang Wen-Ye; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zheng-Fu; Wen Hao

    2015-01-01

    At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations. (paper)

  16. High-capacity quantum key distribution via hyperentangled degrees of freedom

    International Nuclear Information System (INIS)

    Simon, David S; Sergienko, Alexander V

    2014-01-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical. (paper)

  17. The SECOQC quantum key distribution network in Vienna

    International Nuclear Information System (INIS)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  18. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  19. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  20. Polyaniline-based memristive microdevice with high switching rate and endurance

    Science.gov (United States)

    Lapkin, D. A.; Emelyanov, A. V.; Demin, V. A.; Erokhin, V. V.; Feigin, L. A.; Kashkarov, P. K.; Kovalchuk, M. V.

    2018-01-01

    Polyaniline (PANI) based memristive devices have emerged as promising candidates for hardware implementation of artificial synapses (the key components of neuromorphic systems) due to their high flexibility, low cost, solution processability, three-dimensional stacking capability, and biocompatibility. Here, we report on a way of the significant improvement of the switching rate and endurance of PANI-based memristive devices. The reduction of the PANI active channel dimension leads to the increase in the resistive switching rate by hundreds of times in comparison with the conventional one. The miniaturized memristive device was shown to be stable within at least 104 cyclic switching events between high- and low-conductive states with a retention time of at least 103 s. The obtained results make PANI-based memristive devices potentially widely applicable in neuromorphic systems.

  1. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  2. MIMO Four-Way Relaying

    DEFF Research Database (Denmark)

    Liu, Huaping; Sun, Fan; De Carvalho, Elisabeth

    2013-01-01

    Two-way relaying in wireless systems has initiated a large research effort during the past few years. Nevertheless, it represents only a specific traffic pattern and it is of interest to investigate other traffic patterns where such a simultaneous processing of information flows can bring...... performance advantage. In this paper we consider a \\emph{four-way relaying} multiple-input multiple-output (MIMO) scenario, where each of the two Mobile Stations (MSs) has a two-way connection to the same Base Station (BS), while each connection is through a dedicated Relay Station (RS). The RSs are placed...... the sum-rate of the new scheme for Decode-and-Forward (DF) operational model for the RS. We compare the performance with state-of-the-art reference schemes, based on two-way relaying with DF. The results indicate that the sum-rate of the two-phase four-way relaying scheme largely outperforms the four...

  3. Efficient quantum secure communication with a publicly known key

    International Nuclear Information System (INIS)

    Li Chunyan; Li Xihan; Deng Fuguo; Zhou Hongyu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently. (general)

  4. Long-distance quantum key distribution with imperfect devices

    International Nuclear Information System (INIS)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-01-01

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R QKD . The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels. We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols

  5. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yang [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Wan-Su, E-mail: 2010thzz@sina.com [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2017-04-25

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  6. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    International Nuclear Information System (INIS)

    Wang, Yang; Bao, Wan-Su; Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-01-01

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  7. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  8. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  9. Measurements of flow-rate transients in one-phase liquid flow

    International Nuclear Information System (INIS)

    Mueller-Roos, J.

    1975-01-01

    A report is given on a method to determine flow-rate transients in a one-phase flow. Periodic temperature signals are superposed on the flow, from which flow times are calculated through correlation each over a half period. The evaluation is carried out according to the digitalization 'off-line' on a large computer. Rate peaks of over 100% within 1.9 s were qualitatively and quantitatively well represented. (orig./LH) [de

  10. One-way quantum computation via manipulation of polarization and momentum qubits in two-photon cluster states

    International Nuclear Information System (INIS)

    Vallone, G; Pomarico, E; De Martini, F; Mataloni, P

    2008-01-01

    Four-qubit cluster states of two photons entangled in polarization and linear momentum have been used to realize a complete set of single qubit rotations and the C-NOT gate for equatorial qubits with high values of fidelity. By the computational equivalence of the two degrees of freedom our result demonstrate the suitability of two photon cluster states for rapid and efficient one-way quantum computing

  11. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  12. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  13. Study on the security of discrete-variable quantum key distribution over non-Markovian channels

    International Nuclear Information System (INIS)

    Huang Peng; Zhu Jun; He Guangqiang; Zeng Guihua

    2012-01-01

    The dynamic of the secret key rate of the discrete-variable quantum key distribution (QKD) protocol over the non-Markovian quantum channel is investigated. In particular, we calculate the secret key rate for the six-state protocol over non-Markovian depolarizing channels with coloured noise and Markovian depolarizing channels with Gaussian white noise, respectively. We find that the secure secret key rate for the non-Markovian depolarizing channel will be larger than the Markovian one under the same conditions even when their upper bounds of tolerable quantum bit error rate are equal. This indicates that this coloured noise in the non-Markovian depolarizing channel can enhance the security of communication. Moreover, we show that the secret key rate fluctuates near the secure point when the coupling strength of the system with the environment is high. The results demonstrate that the non-Markovian effects of the transmission channel can have a positive impact on the security of discrete-variable QKD. (paper)

  14. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  15. COMPARABLE ANALYSIS REGARDING KEY MACROECONOMIC INDICATORS ON MOLDOVA’S WAY TOWARDS EUROPEAN INTEGRATION

    Directory of Open Access Journals (Sweden)

    Valentina GANCIUCOV

    2015-07-01

    Full Text Available As Moldova has the purpose to enter the European Union the actual situation in the country is analyzed in this article. The article gives the comparative analysis of the basic parameters of Moldova with the other European Union country-members to define the ways of development of the country in the given direction. Since 1994 relations between Moldova and the European Union have developed on an upward trajectory. The dialogue between the two sides officially started that year with the signing of the Partnership and Cooperation Agreement (PCA, which entered into force in 1998 and provided the basis for cooperation with the EU in political, commercial, economic, legal, cultural fields. EU-Moldova relations have advanced to a higher level in 2009 when the country participated in the Eastern Partnership – an instrument of European policy that favored the signing on 29 May 2013 of the Association Agreement, the document which came to replace previous PCA and that is currently the most important element of the legal framework of Moldova-EU dialogue. But beyond the respective treaties signed, individually, between EU and states that intend to join the European community, there are a number of fundamental requirements3 (criteria, which condition the process of European integration of the state with declared intentions of accession. The aim of the research is to analyze to what extent Moldovan economy meet the requirements of economic alignment with EU standards, achieving a comparative analysis of the main relevant macroeconomic indicators. Research methodology. For analysis were used analysis-synthesis method, comparison method and others. Results of the analysis. Part of the criteria analyzed converge with EU requirements, while the most relevant indicators regarding standards of living show reserves show reserves for future improvement, such as the average wage, the lending rate, the exchange rate of the Moldovan Leu against the major international

  16. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  17. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  18. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  19. High performance reconciliation for continuous-variable quantum key distribution with LDPC code

    Science.gov (United States)

    Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua

    2015-03-01

    Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.

  20. Nonlinear detection for a high rate extended binary phase shift keying system.

    Science.gov (United States)

    Chen, Xian-Qing; Wu, Le-Nan

    2013-03-28

    The algorithm and the results of a nonlinear detector using a machine learning technique called support vector machine (SVM) on an efficient modulation system with high data rate and low energy consumption is presented in this paper. Simulation results showed that the performance achieved by the SVM detector is comparable to that of a conventional threshold decision (TD) detector. The two detectors detect the received signals together with the special impacting filter (SIF) that can improve the energy utilization efficiency. However, unlike the TD detector, the SVM detector concentrates not only on reducing the BER of the detector, but also on providing accurate posterior probability estimates (PPEs), which can be used as soft-inputs of the LDPC decoder. The complexity of this detector is considered in this paper by using four features and simplifying the decision function. In addition, a bandwidth efficient transmission is analyzed with both SVM and TD detector. The SVM detector is more robust to sampling rate than TD detector. We find that the SVM is suitable for extended binary phase shift keying (EBPSK) signal detection and can provide accurate posterior probability for LDPC decoding.

  1. Nonlinear Detection for a High Rate Extended Binary Phase Shift Keying System

    Directory of Open Access Journals (Sweden)

    Le-Nan Wu

    2013-03-01

    Full Text Available The algorithm and the results of a nonlinear detector using a machine learning technique called support vector machine (SVM on an efficient modulation system with high data rate and low energy consumption is presented in this paper. Simulation results showed that the performance achieved by the SVM detector is comparable to that of a conventional threshold decision (TD detector. The two detectors detect the received signals together with the special impacting filter (SIF that can improve the energy utilization efficiency. However, unlike the TD detector, the SVM detector concentrates not only on reducing the BER of the detector, but also on providing accurate posterior probability estimates (PPEs, which can be used as soft-inputs of the LDPC decoder. The complexity of this detector is considered in this paper by using four features and simplifying the decision function. In addition, a bandwidth efficient transmission is analyzed with both SVM and TD detector. The SVM detector is more robust to sampling rate than TD detector. We find that the SVM is suitable for extended binary phase shift keying (EBPSK signal detection and can provide accurate posterior probability for LDPC decoding.

  2. An Empirical Limit on the Kilonova Rate from the DLT40 One Day Cadence Supernova Survey

    Science.gov (United States)

    Yang, Sheng; Valenti, Stefano; Cappellaro, Enrico; Sand, David J.; Tartaglia, Leonardo; Corsi, Alessandra; Reichart, Daniel E.; Haislip, Joshua; Kouprianov, Vladimir

    2017-12-01

    Binary neutron star mergers are important in understanding stellar evolution, the chemical enrichment of the universe via the r-process, the physics of short gamma-ray bursts, gravitational waves, and pulsars. The rates at which these coalescences happen is uncertain, but it can be constrained in different ways. One of those is to search for the optical transients produced at the moment of the merging, called a kilonova, in ongoing supernova (SN) searches. However, until now, only theoretical models for a kilonova light curve were available to estimate their rates. The recent kilonova discovery of AT 2017gfo/DLT17ck gives us the opportunity to constrain the rate of kilonovae using the light curve of a real event. We constrain the rate of binary neutron star mergers using the DLT40 Supernova search and the native AT 2017gfo/DLT17ck light curve obtained with the same telescope and software system. Excluding AT 2017gfo/DLT17ck due to visibility issues, which was only discovered thanks to the aLIGO/aVirgo trigger, no other similar transients were detected during the 13 months of daily cadence observations of ∼2200 nearby (<40 Mpc) galaxies. We find that the rate of BNS mergers is lower than 0.47–0.55 kilonovae per 100 years per 1010 {L}{Bȯ } (depending on the adopted extinction distribution). In volume, this translates to < 0.99× {10}-4{}-0.15+0.19, {{Mpc}}-3 {{yr}}-1 (SNe Ia–like extinction distribution), consistent with previous BNS coalescence rates. Based on our rate limit, and the sensitivity of aLIGO/aVirgo during O2, it is very unlikely that kilonova events are lurking in old pointed galaxy SN search data sets.

  3. Inter-hospital communications and transport: turning one-way funnels into two-way networks.

    Science.gov (United States)

    Rokos, Ivan C; Sanddal, Nels D; Pancioli, Arthur M; Wolff, Catherine; Gaieski, David F

    2010-12-01

    The Inter-hospital Communications and Transport workgroup was charged with exploring the current status, barriers, and data necessary to optimize the initial destination and subsequent transfer of patients between and among acute care settings. The subtitle, "Turning Funnels Into Two-way Networks," is descriptive of the approach that the workgroup took by exploring how and when smaller facilities in suburban, rural, and frontier areas can contribute to the daily business of caring for emergency patients across the lower-acuity spectrum-in some instances with consultant support from academic medical centers. It also focused on the need to identify high-acuity patients and expedite triage and transfer of those patients to facilities with specialty resources. Draft research recommendations were developed through an iterative writing process and presented to a breakout session of Academic Emergency Medicine's 2010 consensus conference, "Beyond Regionalization: Integrated Networks of Emergency Care." Priority research areas were determined by informal consensus of the breakout group. A subsequent iterative writing process was undertaken to complete this article. A number of broad research questions are presented. 2010 by the Society for Academic Emergency Medicine.

  4. 60-GHz integrated-circuit high data rate quadriphase shift keying exciter and modulator

    Science.gov (United States)

    Grote, A.; Chang, K.

    1984-01-01

    An integrated-circuit quadriphase shift keying (QPSK) exciter and modulator have demonstrated excellent performance directly modulating a carrier frequency of 60 GHz with an output phase error of less than 3 degrees and maximum amplitude error of 0.5 dB. The circuit consists of a 60-GHz Gunn VCO phase-locked to a low-frequency reference source, a 4th subharmonic mixer, and a QPSK modlator packaged into a small volume of 1.8 x 2.5 x 0.35 in. The use of microstrip has the advantages of small size, light-weight, and low-cost fabrication. The unit has the potential for multigigabit data rate applications.

  5. The Elephants in the Room: Sex, HIV, and LGBT Populations in MENA. Intersectionality in Lebanon; Comment on “Improving the Quality and Quantity of HIV Data in the Middle East and North Africa: Key Challenges and Ways Forward”

    Directory of Open Access Journals (Sweden)

    Rachel L. Kaplan

    2017-08-01

    Full Text Available In response to this insightful editorial, we wish to provide commentary that seeks to highlight recent successes and illuminate the often unspoken hurdles at the intersections of culture, politics, and taboo. We focus on sexual transmission and draw examples from Lebanon, where the pursuit of data in quality and quantity is teaching us lessons about the way forward and where we are experiencing many of the challenges referenced in the editorial such as discrepancies between national statistics and rates derived via research as well as the impact of protracted political conflict and displacement. Two important points were raised in the editorial about HIV in Middle East and North Africa (MENA that we would like to expand further: (1 The epidemic is largely driven by drug-related and sexual behavior among key populations; and (2 Several key populations continue to be criminalized and excluded from surveillance programs.

  6. The SECOQC quantum key distribution network in Vienna

    Science.gov (United States)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  7. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  8. The milky way an insider's guide

    CERN Document Server

    Waller, William H

    2013-01-01

    This book offers an intimate guide to the Milky Way, taking readers on a grand tour of our home Galaxy's structure, genesis, and evolution, based on the latest astronomical findings. In engaging language, it tells how the Milky Way congealed from blobs of gas and dark matter into a spinning starry abode brimming with diverse planetary systems--some of which may be hosting myriad life forms and perhaps even other technologically communicative species. William Waller vividly describes the Milky Way as it appears in the night sky, acquainting readers with its key components and telling

  9. Servant-Leadership: The Online Way! E-Learning Where Community Building Is Key

    Science.gov (United States)

    van de Bunt-Kokhuis, Sylvia; Sultan, Nabil

    2012-01-01

    The digitalisation of educational communities has increased rapidly in the last decade. Modern technologies transform the way educational leaders such as teachers, tutors, deans and supervisors view and manage their educational communities. More often, educational leaders offer a variety of gateways, guiding the e-learners in their search for…

  10. NMR relaxation rate in quasi one-dimensional antiferromagnets

    Science.gov (United States)

    Capponi, Sylvain; Dupont, Maxime; Laflorencie, Nicolas; Sengupta, Pinaki; Shao, Hui; Sandvik, Anders W.

    We compare results of different numerical approaches to compute the NMR relaxation rate 1 /T1 in quasi one-dimensional (1d) antiferromagnets. In the purely 1d regime, recent numerical simulations using DMRG have provided the full crossover behavior from classical regime at high temperature to universal Tomonaga-Luttinger liquid at low-energy (in the gapless case) or activated behavior (in the gapped case). For quasi 1d models, we can use mean-field approaches to reduce the problem to a 1d one that can be studied using DMRG. But in some cases, we can also simulate the full microscopic model using quantum Monte-Carlo techniques. This allows to compute dynamical correlations in imaginary time and we will discuss recent advances to perform stochastic analytic continuation to get real frequency spectra. Finally, we connect our results to experiments on various quasi 1d materials.

  11. Free-Space Quantum Key Distribution with a High Generation Rate KTP Waveguide Photon-Pair Source

    Science.gov (United States)

    Wilson, J.; Chaffee, D.; Wilson, N.; Lekki, J.; Tokars, R.; Pouch, J.; Lind, A.; Cavin, J.; Helmick, S.; Roberts, T.; hide

    2016-01-01

    NASA awarded Small Business Innovative Research (SBIR) contracts to AdvR, Inc to develop a high generation rate source of entangled photons that could be used to explore quantum key distribution (QKD) protocols. The final product, a photon pair source using a dual-element periodically- poled potassium titanyl phosphate (KTP) waveguide, was delivered to NASA Glenn Research Center in June of 2015. This paper describes the source, its characterization, and its performance in a B92 (Bennett, 1992) protocol QKD experiment.

  12. Utility of Online Communities – Ways One Can Benefit From One’s Online Life

    Directory of Open Access Journals (Sweden)

    Ioana Cărtărescu

    2010-10-01

    Full Text Available As many of today’s social scientists (such as Beck, Giddens, Howard, Vlăsceanu etc have remarked, the modern age has brought with itself a great series of fast-paced changes in the average man’s lifestyle. Nothing is safe or can be taken for granted anymore. Families disintegrate, traditions become obsolete and professional re-qualifications are necessary every few years just to keep upwith the younger, tougher competition on the labour market. Forced to constantly changed ones place of residence, ones entourage, work and habits leads to a feeling of loneliness, of not really being a part of modern society and its communities, of being left out to fend for yourself. Luckily, modernity has also brought with itself a never seen before technological boom which instantly permitted not only the improvement of one’s biological life, but also provided society with the opportunity to bridge the gap between people. One of the most significant of these innovations is the Internet, a non-geographical space that people, in just a few short years, have colonized andmade their own, projected their identities into and created solid and durable communities that, which were less subjected to being torn apart by distance and time. This paper’s object is to show how and why being part of an online community is a great way for one to get a stronger feeling of social integration and be part of a somewhat more fair, less prejudiced world.

  13. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  14. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    Science.gov (United States)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  15. Stellar neutron capture rateskey data for the s process

    Directory of Open Access Journals (Sweden)

    Käppeler F.

    2013-12-01

    Full Text Available Neutron reactions are responsible for the formation of the elements heavier than iron. The corresponding scenarios relate to the He- and C- burning phases of stellar evolution (s process and to supernova explosions (r and p processes. The s process, which is characterized by low neutron densities, operates in or near the valley of β stability and has produced about half of the elemental abundances between Fe and Bi in the solar system and in the Universe. Because the s abundances are essentially determined by the (n, γ cross sections along the reaction path, accurate neutron data constitute the key input for s process studies. Important constraints for the physical conditions at the stellar sites can be inferred by comparison of the abundance patterns from current s-process models with solar system material or presolar grains. The experimental methods for the determination of stellar (n, γ rates are outlined at the example of recent cross section measurements and remaining quests will be discussed with respect to existing laboratory neutron sources and new developments.

  16. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  17. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  18. Estimating the Mean Circulation and Water Exchange of the Gulf of Suez-Red Sea via a Validated One-Way Atmospheric-Hydrodynamic Coupled Model

    Science.gov (United States)

    Eladawy, Ahmed; Shaltout, Mohamed; Sousa, Magda Catarina; Dias, João Miguel; Nadaoka, Kazuo

    2018-05-01

    The Gulf of Suez, Northern Islands protected area, and Hurghada zone are experiencing mega developments in all sectors including tourism, industry, and logistics. The need for moderately accurate near-shore hydrodynamic models is increasing to support the sustainable development of this oceanic area. This can be accomplished by following a nesting approach including the downscaling of global atmospheric and oceanic models into local models using higher resolution datasets. This work aims to present the development of a one-way coupling between atmospheric and hydrodynamic models for the Gulf of Suez (GOS) to understand the local oceanic characteristics and processes. The Regional Climate Model system (RegCM4) is used to simulate moderate resolution atmospheric features and its results are used to force a local dedicated application of Delft3D model. The results indicate that the predicted water level, water temperature, and evaporation accurately follow in situ measurements, remotely sensed data, and re-analysis data. The results suggest that the annual sea surface temperature is averaged at 23 °C, while the annual average of evaporation rates equals 8.02 mm/day. The study suggests that the water level displays a marked seasonal and spatial variation. Moreover, the water balance in the Gulf of Suez was controlled by the difference between inflows and outflows through the Straits of Gubal and by the net precipitation. In addition, the water balance indicated a net loss of approximately 3.9 × 10-3 m of water during 2013. Moreover, the exchange through the Straits of Gubal showed a two-way exchange with a net inflow of 0.0007 Sv, where the outflow dominated in the surface layer along the western coast and the inflow dominated in the lower layers along the middle of the Straits. To conclude, the one-way coupling modeling technique proved to be a reliable tool for studying local features of the GOS region.

  19. Teamwork the key to good patient care.

    Science.gov (United States)

    Baillie, Jonathan

    2013-05-01

    In a year when, with the inception of the new Clinical Commissioning Groups, the way that healthcare is procured and delivered will see radical changes, this month's HefmA 2013 National Conference & Exhibition will have as its theme, 'Many Players, One Goal: The Patient'. As HEJ editor, Jonathan Baillie reports, among the wide-ranging estates and facilities topics set for discussion will be 'Getting the patient environment right'; 'Dementia Building for the Future'; 'Waterborne Infections; Lessons Learned'; 'Incorporating lean thinking into design', and the key challenges faced by the estates and facilities sector. The keynote address, touching on a wide range of issues common to all large organisations, will be given by one of the best known 'women in football', and will also reflect particularly on the importance of teamwork.

  20. Two-electron one-photon decay rates in doubly ionized atoms

    International Nuclear Information System (INIS)

    Baptista, G.B.

    1984-01-01

    The transion rate for the two-electron one-photon and one-electron one-photon decaying processes in atoms bearing initially two K-shell vacancies were evaluated for Ne up to Zr. The two-electron one-photon decay process is considered to be the result of the interaction between the jumping electrons and their interaction with the radiation field. The calculation is performed in second order perturbation theory and the many particle states are constructed from single particle solutions. The present approach allows one to discuss several aspects of the decaying process. The results obtained for the branching ratio between the two processes reproduces reasonably well available experimental data and show an almost linear dependence on the second power of the atomic number. A comparison with other theoretical predictions is also presented for the two decaying processes and the strong dependence of the branching ratio on the initial configuration of the decaying atom is pointed out. (Author) [pt

  1. Quantum key distribution with an unknown and untrusted source

    Science.gov (United States)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  2. Human Resources – One of the Key Challenges of Tourism Development in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Buneta Anđelka

    2016-12-01

    Full Text Available Tourist activity in the Republic of Croatia is one of the leading and most promising activities. It is our past, present and future. According to the National Bank, the share of revenues from travel - tourism in overall GDP in the first 9 months of 2015 was 22.2%, an increase of 1.2% compared to the same period in 2014. In the third quarter share of revenues from travel - tourism in total GDP amounted to 41.3%, as compared to the same period in 2014, representing a growth of 1.4%. The conclusion is that tourism is one of the leading economic sectors in the Republic of Croatia. Due to realized 78 million and 569,000 overnight stays (6.8% more than in 2014 and more than 8 billion of foreign exchange inflows, the Republic of Croatia on the overall tourism market has been recognized as an important destination whose development potentials have not yet been exhausted. Relevant institutions and predictions underline the fact that tourism is one of the keys for faster integration of Croatia in the entire world economy and the networked society, from which it can be read that Croatia must view this sector in a new way and allow tourism to undergo complete transformation, in order to cope with future competitive challenges more easily. According to estimates by the World Travel & Tourism Council direct and indirect employment in the tourism sector in 2008 was about 300,000 employees, but that number will have increased by additional 100,000 in the next ten years. The Croatian tourism today employs 35-40% of workers. Thus, the tourism industry is a comprehensive and a very important generator of jobs of different profiles - from catering and hotel industry to entertainment and animation. In the light of progress in the development of tourism, and regardless of specific personnel, Croatia still needs a lot of work on the construction of the existing profile of tourism personnel and management and educate the tourist interest in tourism future. In addition

  3. One Team, One Fight, One Future, Total Army Integration

    National Research Council Canada - National Science Library

    1998-01-01

    ...; and, most important, our vision for maintaining a trained and ready force. As the ideas in One Team, One Fight, One Future unfold, you will find the key themes of Total Army integration emerging again and again...

  4. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  5. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  6. One-way ticket” Romanian Migration at the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Silvia Bocancea

    2011-12-01

    Full Text Available Unlike the new age of migration that we are experiencing now, the social mobility specific to the end of the 19th century and the beginning of the 20th century may be defined by the expression “one way ticket”; the immigrant, usually a man, used to leave his country of origin and settle for good in his host-country (he did not look for his happiness from state to state, as it happens now. The Romanian migration of that time was directed mainly towards the New World (particularly to the USA, and less to Canada. This paper is an attempt to sketch the image of Romanian emigration by taking into account the peculiarities determined by: emigration causes, geographical predominance, social composition, occupational options in the host-country, and the structure of Romanian immigrant communities.

  7. Study of the damage rate caused by intervertebral foramen type inside and outside and the pass of the intervertebral DRG RF puncture way.

    Science.gov (United States)

    Sun, Jiashu; Zhang, Haitao

    2014-09-01

    This paper was to analyze and contrast the damage rate on the thoracic segment different position of the dorsal root ganglion(dorsal root ganglion, DRG) caused by different puncture path in radiofrequency ablation, thus the best RF target way for the thoracic segment of different types of DRG was confirmed. According to the difference of puncture and ablation damage way, 14 segmental spinal specimens were randomly divided into three groups, and then conducted DRG radiofrequency damage on percutaneous puncture path according to the type of DRG position.The damage effect of different puncture path by the judgment standard of the result of pathology analyzed. The experiment showed that RF damage of group A were 72.58 ± 18.88%, 54.16 ± 24.84% and 32.85 ± 28.11%; that of group B were 771.86 ± 15.15% and 72.02 ± 17.86%, 57.14 ± 18.02% and 52.47 ± 20.64%, 68.75 ± 14.63% and 71.78 ± 16.00%; and that of group C were 82.46 ± 14.10%, 81.53 ± 11.81% and 80.83 ± 13.33%. It was concluded that the singleness of DRG puncture route is one of the important reasons for the poor thoracic segments DRG radiofrequency (RF) ablation effect. While according to the type of DRG different positions with double joint puncture path can significantly improve the rate of DRG RF damage.

  8. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  9. An Examination of Differences between Promotion Rates of Third Grade Youth in Foster Care: A Study on One-to-One Tutoring

    Science.gov (United States)

    Franklin, Josette R.

    2017-01-01

    This quantitative research study analyzed archival data to determine if there was a significant difference in promotion rates from third to fourth grade between students in foster care who received one-to-one tutoring and those students in foster care who did not receive one-to-one tutoring over two school years. This study also analyzed student…

  10. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  11. File-Based One-Way BISON Coupling Through VERA: User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-02-28

    Activities to incorporate fuel performance capabilities into the Virtual Environment for Reactor Applications (VERA) are receiving increasing attention [1–6]. The multiphysics emphasis is expanding as the neutronics (MPACT) and thermal-hydraulics (CTF) packages are becoming more mature. Capturing the finer details of fuel phenomena (swelling, densification, relocation, gap closure, etc.) is the natural next step in the VERA development process since these phenomena are currently not directly taken into account. While several codes could be used to accomplish this, the BISON fuel performance code [8,9] being developed by the Idaho National Laboratory (INL) is the focus of ongoing work in the Consortium for Advanced Simulation of Light Water Reactors (CASL). Built on INL’s MOOSE framework [10], BISON uses the finite element method for geometric representation and a Jacobian-free Newton-Krylov (JFNK) scheme to solve systems of partial differential equations for various fuel characteristic relationships. There are several modes of operation in BISON, but, this work uses a 2D azimuthally symmetric (R-Z) smeared-pellet model. This manual is intended to cover (1) the procedure pertaining to the standalone BISON one-way coupling from VERA and (2) the procedure to generate BISON fuel temperature tables that VERA can use.

  12. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  13. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  14. Key factors influencing rates of heterotrophic sulfate reduction in active seafloor hydrothermal massive sulfide deposits

    Directory of Open Access Journals (Sweden)

    Kiana Laieikawai Frank

    2015-12-01

    Full Text Available Hydrothermal vents are thermally and geochemically dynamic habitats, and the organisms therein are subject to steep gradients in temperature and chemistry. To date, the influence of these environmental dynamics on microbial sulfate reduction has not been well constrained. Here, via multivariate experiments, we evaluate the effects of key environmental variables (temperature, pH, H2S, SO42-, DOC on sulfate reduction rates and metabolic energy yields in material recovered from a hydrothermal flange from the Grotto edifice in the Main Endeavor Field, Juan de Fuca Ridge. Sulfate reduction was measured in batch reactions across a range of physico-chemical conditions. Temperature and pH were the strongest stimuli, and maximum sulfate reduction rates were observed at 50 °C and pH 6, suggesting that the in situ community of sulfate-reducing organisms in Grotto flanges may be most active in a slightly acidic and moderate thermal/chemical regime. At pH 4, sulfate reduction rates increased with sulfide concentrations most likely due to the mitigation of metal toxicity. While substrate concentrations also influenced sulfate reduction rates, energy-rich conditions muted the effect of metabolic energetics on sulfate reduction rates. We posit that variability in sulfate reduction rates reflect the response of the active microbial consortia to environmental constraints on in situ microbial physiology, toxicity, and the type and extent of energy limitation. These experiments help to constrain models of the spatial contribution of heterotrophic sulfate reduction within the complex gradients inherent to seafloor hydrothermal deposits.

  15. Qualified nurses' rate new nursing graduates as lacking skills in key clinical areas.

    Science.gov (United States)

    Missen, Karen; McKenna, Lisa; Beauchamp, Alison; Larkins, Jo-Ann

    2016-08-01

    The aim of this study was to explore perceptions of qualified nurses on the abilities of newly registered nursing graduates to perform a variety of clinical skills. Evidence from the literature suggests that undergraduate nursing programmes do not adequately prepare nursing students to be practice-ready on completion of their nursing courses. A descriptive quantitative design was used. Participants were recruited through the Australian Nursing and Midwifery Federation, Victorian branch. A brief explanation of the study and a link to the survey were promoted in their monthly e-newsletter. A total of 245 qualified nurses in the state of Victoria, Australia participated in this study. A survey tool of 51 clinical skills and open-ended questions was used, whereby participants were asked to rate new nursing graduates' abilities using a 5-point Likert scale. Overall participants rated new nursing graduates' abilities for undertaking clinical skills as good or very good in 35·3% of skills, 33·3% were rated as adequate and 31·4% rated as being performed poorly or very poorly. Of concern, essential clinical skills, such as critical thinking and problem solving, working independently and assessment procedures, were found to be poorly executed and affecting new registered nurses graduates' competence. The findings from this study can further serve as a reference for nursing education providers to enhance nursing curricula and work collaboratively with healthcare settings in preparing nurses to be competent, safe practitioners on completion of their studies. Identifying key areas in which new nursing graduates are not yet competent means that educational providers and educators from healthcare settings can focus on these skills in better preparing our nurses to be work ready. © 2016 John Wiley & Sons Ltd.

  16. An Efficient Approximation of the Coronal Heating Rate for use in Global Sun-Heliosphere Simulations

    Science.gov (United States)

    Cranmer, Steven R.

    2010-02-01

    The origins of the hot solar corona and the supersonically expanding solar wind are still the subject of debate. A key obstacle in the way of producing realistic simulations of the Sun-heliosphere system is the lack of a physically motivated way of specifying the coronal heating rate. Recent one-dimensional models have been found to reproduce many observed features of the solar wind by assuming the energy comes from Alfvén waves that are partially reflected, then dissipated by magnetohydrodynamic turbulence. However, the nonlocal physics of wave reflection has made it difficult to apply these processes to more sophisticated (three-dimensional) models. This paper presents a set of robust approximations to the solutions of the linear Alfvén wave reflection equations. A key ingredient of the turbulent heating rate is the ratio of inward-to-outward wave power, and the approximations developed here allow this to be written explicitly in terms of local plasma properties at any given location. The coronal heating also depends on the frequency spectrum of Alfvén waves in the open-field corona, which has not yet been measured directly. A model-based assumption is used here for the spectrum, but the results of future measurements can be incorporated easily. The resulting expression for the coronal heating rate is self-contained, computationally efficient, and applicable directly to global models of the corona and heliosphere. This paper tests and validates the approximations by comparing the results to exact solutions of the wave transport equations in several cases relevant to the fast and slow solar wind.

  17. Trojan horse attacks on counterfactual quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Xiuqing, E-mail: xqqyang@163.com [School of Science, Beijing Jiaotong University, Beijing 100044 (China); College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wei, Kejin; Ma, Haiqiang [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Sun, Shihai, E-mail: shsun@nudt.edu.cn [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Du, Yungang [College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wu, Lingan [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China)

    2016-04-22

    There has been much interest in “counterfactual quantum cryptography” (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes. - Highlights: • We find the attacks available for the two-way protocol become possible for the practical counterfactual systems. • It does not require the assumption that it works on the counterfactual systems only in a finite key scenario. • Compared to the other attack models, our scheme is relatively simple for an eavesdropper.

  18. The Confusion of Content Marketing : a study to clarify the key dimensions of content marketing

    OpenAIRE

    Claesson, Amanda; Jonsson, Albin

    2017-01-01

    Content marketing is a popular marketing strategy, which has increased significantly during the last years. The term content marketing is new but companies have been working with parts of the strategy for decades. The new digital era changed the communication from a one-way to a two-way communica- tion. Customers now have a demand for relevant content that is valuable for them. The purpose of this dissertation is to develop an understanding of this marketing strategy, and clarify the key dime...

  19. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  20. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  1. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  2. Study on stress characteristics of Francis hydraulic turbine runner based on two-way FSI

    International Nuclear Information System (INIS)

    Zhu, W R; Xiao, R F; Yang, W; Wang, F J; Liu, J

    2012-01-01

    In recent years, cracking phenomenon occurs in many large-sized turbines both nationally and internationally, which has threatened the stable operation of hydraulic turbines. Consequently, Stress characteristics calculation and analysis of a Francis hydraulic turbine runner by application of fluid-structure interaction (FSI) technology become significantly important. In order to introduce two-way coupling technology to hydraulic machinery, two-way FSI technology is applied in this article to calculate and analyze stress characteristics. Through coordinate system transformation, the continuity equations and Navier-Stokes equations in the Cartesian coordinates system are firstly transformed to ALE coordinates system. The fluid field control equations are then constructed and discrete equations can be obtained by using flow-condition-based interpolation (FBIC-C). The structure static mechanics equations used are established in rotation coordinate system, and modeled with the finite method. Two-way coupling is computed by using iteration method. The fluid equations and structure equations are iterated until coupling coefficients converge. According to structure result, the maximum stress, displacement as well as its location can be found. As a result, the most easily wear position can be discovered which provides valuable basis for optimized design and stable operation of Francis hydraulic turbines. After comparing the results with that of one-way coupling, it is discovered that displacements is the key factors which affects the results of one-way and two-way coupling.

  3. Collimated-hole structures as efficient differential pumping barrier, one-way valve and tool for aligning Penning traps

    International Nuclear Information System (INIS)

    Kluge, H.-Jürgen; Block, Michael; Herfurth, Frank

    2011-01-01

    A collimated-hole structure consists of a very large number of parallel channels which have each a very small diameter and are closely packed together. Such devices, installed in vacuum systems allow one to separate regions of very different gas pressures. A collimated-hole structure has high transmission for a directed ion beam with low emittance but a very low conductance for rest gas atoms or molecules exhibiting random walk. Therefore it is proposed to use such a structure as one-way valve and/or efficient differential pumping barrier in set-ups using Penning traps. Furthermore, these devices might be very useful to align the axis of a Penning trap with the direction of the magnetic field lines which is essential to avoid systematic uncertainties in high-accuracy mass spectroscopy.

  4. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  5. No-go theorem for one-way quantum computing on naturally occurring two-level systems

    International Nuclear Information System (INIS)

    Chen Jianxin; Chen Xie; Duan Runyao; Ji Zhengfeng; Zeng Bei

    2011-01-01

    The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-(5/2) and spin-(3/2) systems. It is, of course, desirable to have a natural resource state in a spin-(1/2), that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-(1/2) frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.

  6. Neocatastrophism and the milky way astrobiological landscape

    Directory of Open Access Journals (Sweden)

    Vukotić B.

    2008-01-01

    Full Text Available The number and distribution of habitable planets in the Milky Way is one of the foremost problems of contemporary astrobiological research. We investigate the effects of applying general neocatastrophic paradigm to the evolution of the Galactic Habitable Zone. In this paper, we investigate the limits of simple, 1-dimensional astrobiological models, and consider the role of regulation mechanisms in shapening the 'astrobiological landscape'. We show that the transition from predominantly gradualist to predominantly (neocatastrophist history of our Galaxy leads to the build-up of large-scale correlations between habitable sites, offering possible keys to such important problems as Carter's 'anthropic' argument and Fermi's paradox. In addition, we consider the possibilities for extending the present class of models into spatially realistic 3-dimensional case via probabilistic cellular automata.

  7. Neocatastrophism and the Milky Way Astrobiological Landscape

    Directory of Open Access Journals (Sweden)

    Vukotić, B.

    2008-06-01

    Full Text Available The number and distribution of habitable planets in the Milky Way is one of the foremost problems of contemporary astrobiological research. We investigate the effects of applying general neocatastrophic paradigm to the evolution of the Galactic Habitable Zone. In this paper, we investigate the limits of simple, 1-dimensional astrobiological models, and consider the role of regulation mechanisms in shapening the "astrobiological landscape". We show that the transition from predominantly gradualist to predominantly (neocatastrophist history of our Galaxy leads to the build-up of large-scale correlations between habitable sites, offering possible keys to such important problems as Carter's "anthropic" argument and Fermi's paradox. In addition, we consider the possibilities for extending the present class of models into spatially realistic 3-dimensional case via probabilistic cellular automata.

  8. Predictive Maintenance: One key to improved power plant availability

    International Nuclear Information System (INIS)

    Mobley; Allen, J.W.

    1986-01-01

    Recent developments in microprocessor technology has provided the ability to routinely monitor the actual mechanical condition of all rotating and reciprocating machinery and process variables (i.e. pressure, temperature, flow, etc.) of other process equipment within an operating electric power generating plant. This direct correlation between frequency domain vibration and actual mechanical condition of machinery and trending process variables of non-rotating equipment can provide the ''key'' to improving the availability and reliability, thermal efficiency and provide the baseline information necessary for developing a realistic plan for extending the useful life of power plants. The premise of utilizing microprocessor-based Predictive Maintenance to improve power plant operation has been proven by a number of utilities. This paper provides a comprehensive discussion of the TEC approach to Predictive Maintenance and examples of successful programs

  9. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  10. Free-Space Quantum Key Distribution with a High Generation Rate Potassium Titanyl Phosphate Waveguide Photon-Pair Source

    Science.gov (United States)

    Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip; Floyd, Bertram M.; Lind, Alexander J.; hide

    2016-01-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nanometer pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nanometer photons are up-converted to a single 532-nanometer photon in the first stage. In the second stage, the 532-nanometer photon is down-converted to an entangled photon-pair at 800 nanometer and 1600 nanometer which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.

  11. The Elephants in the Room: Sex, HIV, and LGBT Populations in MENA. Intersectionality in Lebanon Comment on "Improving the Quality and Quantity of HIV Data in the Middle East and North Africa: Key Challenges and Ways Forward".

    Science.gov (United States)

    Kaplan, Rachel L; El Khoury, Cynthia

    2016-12-04

    In response to this insightful editorial, we wish to provide commentary that seeks to highlight recent successes and illuminate the often unspoken hurdles at the intersections of culture, politics, and taboo. We focus on sexual transmission and draw examples from Lebanon, where the pursuit of data in quality and quantity is teaching us lessons about the way forward and where we are experiencing many of the challenges referenced in the editorial such as discrepancies between national statistics and rates derived via research as well as the impact of protracted political conflict and displacement. Two important points were raised in the editorial about HIV in Middle East and North Africa (MENA) that we would like to expand further: (1) The epidemic is largely driven by drug-related and sexual behavior among key populations; and (2) Several key populations continue to be criminalized and excluded from surveillance programs. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  12. Examination of roundwood utilization rates in West Virginia

    Science.gov (United States)

    Shawn T. Grushecky; Jan Wiedenbeck; Curt C. Hassler

    2013-01-01

    Forest harvesting is an integral part of the West Virginia forest economy. This component of the supply chain supports a diverse array of primary and secondary processors. A key metric used to describe the efficiency of the roundwood extraction process is the logging utilization factor (LUF). The LUF is one way managers can discern the overall use of harvested...

  13. On the sub-model errors of a generalized one-way coupling scheme for linking models at different scales

    Science.gov (United States)

    Zeng, Jicai; Zha, Yuanyuan; Zhang, Yonggen; Shi, Liangsheng; Zhu, Yan; Yang, Jinzhong

    2017-11-01

    Multi-scale modeling of the localized groundwater flow problems in a large-scale aquifer has been extensively investigated under the context of cost-benefit controversy. An alternative is to couple the parent and child models with different spatial and temporal scales, which may result in non-trivial sub-model errors in the local areas of interest. Basically, such errors in the child models originate from the deficiency in the coupling methods, as well as from the inadequacy in the spatial and temporal discretizations of the parent and child models. In this study, we investigate the sub-model errors within a generalized one-way coupling scheme given its numerical stability and efficiency, which enables more flexibility in choosing sub-models. To couple the models at different scales, the head solution at parent scale is delivered downward onto the child boundary nodes by means of the spatial and temporal head interpolation approaches. The efficiency of the coupling model is improved either by refining the grid or time step size in the parent and child models, or by carefully locating the sub-model boundary nodes. The temporal truncation errors in the sub-models can be significantly reduced by the adaptive local time-stepping scheme. The generalized one-way coupling scheme is promising to handle the multi-scale groundwater flow problems with complex stresses and heterogeneity.

  14. Deciphering the function and regulation of SbCAD2: A key lignin gene to improve sorghum biomass degradability

    Science.gov (United States)

    Genetic modification of lignin biosynthesis in the cell wall of biofuel feedstocks is likely one of the most effective ways to improve the conversion efficiency of cellulosic biomass to biofuel for the bioenergy industry. As a key enzyme that catalyzes the last step of monolignol synthesis, cinnamy...

  15. Security proof of continuous-variable quantum key distribution using three coherent states

    Science.gov (United States)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  16. Libraries and key performance indicators a framework for practitioners

    CERN Document Server

    Appleton, Leo

    2017-01-01

    Libraries and Key Performance Indicators: A Framework for Practitioners explores ways by which libraries across all sectors can demonstrate their value and impact to stakeholders through quality assurance and performance measurement platforms, including library assessment, evaluation methodologies, surveys, and annual reporting. Whilst several different performance measurement tools are considered, the book's main focus is on one tool in particular: Key Performance Indicators (KPIs). KPIs are increasingly being used to measure the performance of library and information services, however, linking KPIs to quality outcomes, such as impact and value can prove very difficult. This book discusses, in detail, the concept of KPIs in the broader context of library assessment and performance measurement. Through reviewing some of the applied theory around using KPIs, along with harvesting examples of current best practices in KPI usage from a variety of different libraries, the book demystifies library KPIs, providing ...

  17. Give me five! - reasons for two-way communication between experts and citizens in relation to air pollution risk

    Science.gov (United States)

    Loroño-Leturiondo, Maria; O'Hare, Paul; Cook, Simon; Hoon, Stephen R.; Illingworth, Sam

    2018-04-01

    Air pollution is a major environmental concern for many populations worldwide. Communication efforts so far have been based on a one-way provision of evidence and information from experts to society, and have arguably failed in their mission to foster a more aware and engaged society, or to result in cleaner air. Globally we are facing both an air quality crisis and a communication emergency. This paper focuses on the communication of air pollution risk, from the threats it poses (e.g. severe impacts to human health) to the opportunities it can create (e.g. behavioural or technological alternatives that lead to cleaner air). It supports the case for moving away from one-way communication, and identifies five key benefits of a practical two-way communication between experts and citizens in order to engender positive change and improve global air quality.

  18. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  19. Twenty-one Ways to Develop Esprit De Corps Among Your Student Officials.

    Science.gov (United States)

    Kovalakides, Nick

    Student officials for intramural sports can be given special training to enhance their aptitude in the field, but their attitude is more difficult to develop. This paper suggests 21 ways to develop attitude among student officials. Some of the suggestions are: Athletic departments should emphasize the role of the official in the intramural…

  20. One-way hash function construction based on chaotic map network

    International Nuclear Information System (INIS)

    Yang Huaqian; Wong, K.-W.; Liao Xiaofeng; Wang Yong; Yang Degang

    2009-01-01

    A novel chaotic hash algorithm based on a network structure formed by 16 chaotic maps is proposed. The original message is first padded with zeros to make the length a multiple of four. Then it is divided into a number of blocks each contains 4 bytes. In the hashing process, the blocks are mixed together by the chaotic map network since the initial value and the control parameter of each tent map are dynamically determined by the output of its neighbors. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high flexibility, as required by practical keyed hash functions.

  1. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran

    2016-01-01

    , this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find...... the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of candidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...

  2. Memory-assisted quantum key distribution resilient against multiple-excitation effects

    Science.gov (United States)

    Lo Piparo, Nicolò; Sinclair, Neil; Razavi, Mohsen

    2018-01-01

    Memory-assisted measurement-device-independent quantum key distribution (MA-MDI-QKD) has recently been proposed as a technique to improve the rate-versus-distance behavior of QKD systems by using existing, or nearly-achievable, quantum technologies. The promise is that MA-MDI-QKD would require less demanding quantum memories than the ones needed for probabilistic quantum repeaters. Nevertheless, early investigations suggest that, in order to beat the conventional memory-less QKD schemes, the quantum memories used in the MA-MDI-QKD protocols must have high bandwidth-storage products and short interaction times. Among different types of quantum memories, ensemble-based memories offer some of the required specifications, but they typically suffer from multiple excitation effects. To avoid the latter issue, in this paper, we propose two new variants of MA-MDI-QKD both relying on single-photon sources for entangling purposes. One is based on known techniques for entanglement distribution in quantum repeaters. This scheme turns out to offer no advantage even if one uses ideal single-photon sources. By finding the root cause of the problem, we then propose another setup, which can outperform single memory-less setups even if we allow for some imperfections in our single-photon sources. For such a scheme, we compare the key rate for different types of ensemble-based memories and show that certain classes of atomic ensembles can improve the rate-versus-distance behavior.

  3. One Way to Rein in the Cost of Textbooks: Make Them Free

    Science.gov (United States)

    Delespinasse, Paul F.

    2008-01-01

    The prices for college texts have soared way beyond inflation for the last quarter-century. As such, they have become a burden on today's financially strapped students. From the point of students and of faculty members who are concerned about their students' welfare, the important question is what can be done to drive text prices back down. In…

  4. Theory of wave propagation in magnetized near-zero-epsilon metamaterials: evidence for one-way photonic states and magnetically switched transparency and opacity.

    Science.gov (United States)

    Davoyan, Arthur R; Engheta, Nader

    2013-12-20

    We study propagation of transverse-magnetic electromagnetic waves in the bulk and at the surface of a magnetized epsilon-near-zero (ENZ) medium in a Voigt configuration. We reveal that in a certain range of material parameters novel regimes of wave propagation emerge; we show that the transparency of the medium can be altered with the magnetization leading either to magnetically induced Hall opacity or Hall transparency of the ENZ. In our theoretical study, we demonstrate that surface waves at the interface between either a transparent or an opaque Hall medium and a homogeneous medium may, under certain conditions, be predominantly one way. Moreover, we predict that one-way photonic surface states may exist at the interface of an opaque Hall ENZ and a regular metal, giving rise to the possibility for backscattering immune wave propagation and isolation.

  5. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  6. Semiquantum-key distribution using less than four quantum states

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen; Li Lvzhou; Wu Lihua; Li Lvjun

    2009-01-01

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  7. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  8. WAYS OF REDUCTION OF ADVERSE FEEDING EFFECT ON ANIMALS

    OpenAIRE

    Коnоnеnко S. I.

    2016-01-01

    The successful development of livestock requires maintaining and further increasing of the genetic potential, the basis for the manifestation of which is the adequite balanced feeding. Currently, one of the most urgent problems of livestock breeding is to find ways for reduction of the negative impact of various feeding factors on the animals. In industrial conditions, it is difficult to exclude various feed stresses, which lead to a decrease in productivity, survival rate and ill health of a...

  9. New Ways for EUROPRACTICE Training and Best Practice Service

    DEFF Research Database (Denmark)

    Olesen, Ole

    1997-01-01

    .Among those should be mentioned intelligent use of internet, multimedia training and RF high speed low power training.TBPS is primarily a course broker negotiating with more than 45 course vendors to get highly qualified courses at different levels and at moderate prices in the 5 key microelectronics areas...... been organized to fill the gap, and information about the courses is distributed in different ways.Intelligent use of internet and multimedia technology promotes micro-electronics training in a very effective way.This is the most effective way to promote the large number of courses...

  10. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  11. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  12. Parents of preschoolers’ usage of television program rating symbols and their protective ways from television

    Directory of Open Access Journals (Sweden)

    Çağla Banko

    2017-04-01

    Full Text Available The aim of this study is detecting parent’s, who have 3-6 ages of children, knowledge and usage level of these systems, and their protective ways for TV. Research sample was formed by 130 mothers in qualiatative part of the study and 8 mothers in quantitative part of the study.  In this study, which include both quantitative and qualitative methods, semi-structured interview form and survey were used. For the evaluation of qualitative data, ANOVA and t-test were used. The relationship between parents’ awareness level and program rating symbols usage level was revealed by correlation analysis. The evaluation of quantitative data was carried out with content analysis. Findings show that participants mostly know television content rating systems except symbol used for negative behaviours. Moreover, usage level and children guidance level of participants are generally high. Participant’s education level was the only effective variable of the study. Post hoc test showed that  and their awareness and guidance level. After qualitative analyzes it is found that families use television on the purpose of entertainment and education. Parents thought that TV includes negative sample behaviors and parents protect their children from negative effects of TV by controlling their watching.

  13. DEVELOPING AN EXCELLENT SEDIMENT RATING CURVE FROM ONE HYDROLOGICAL YEAR SAMPLING PROGRAMME DATA: APPROACH

    Directory of Open Access Journals (Sweden)

    Preksedis M. Ndomba

    2008-01-01

    Full Text Available This paper presents preliminary findings on the adequacy of one hydrological year sampling programme data in developing an excellent sediment rating curve. The study case is a 1DD1 subcatchment in the upstream of Pangani River Basin (PRB, located in the North Eastern part of Tanzania. 1DD1 is the major runoff-sediment contributing tributary to the downstream hydropower reservoir, the Nyumba Ya Mungu (NYM. In literature sediment rating curve method is known to underestimate the actual sediment load. In the case of developing countries long-term sediment sampling monitoring or conservation campaigns have been reported as unworkable options. Besides, to the best knowledge of the authors, to date there is no consensus on how to develop an excellent rating curve. Daily-midway and intermittent-cross section sediment samples from Depth Integrating sampler (D-74 were used to calibrate the subdaily automatic sediment pumping sampler (ISCO 6712 near bank point samples for developing the rating curve. Sediment load correction factors were derived from both statistical bias estimators and actual sediment load approaches. It should be noted that the ongoing study is guided by findings of other studies in the same catchment. For instance, long term sediment yield rate estimated based on reservoir survey validated the performance of the developed rating curve. The result suggests that excellent rating curve could be developed from one hydrological year sediment sampling programme data. This study has also found that uncorrected rating curve underestimates sediment load. The degreeof underestimation depends on the type of rating curve developed and data used.

  14. A practical way to estimate retail tobacco sales violation rates more accurately.

    Science.gov (United States)

    Levinson, Arnold H; Patnaik, Jennifer L

    2013-11-01

    U.S. states annually estimate retailer propensity to sell adolescents cigarettes, which is a violation of law, by staging a single purchase attempt among a random sample of tobacco businesses. The accuracy of single-visit estimates is unknown. We examined this question using a novel test-retest protocol. Supervised minors attempted to purchase cigarettes at all retail tobacco businesses located in 3 Colorado counties. The attempts observed federal standards: Minors were aged 15-16 years, were nonsmokers, and were free of visible tattoos and piercings, and were allowed to enter stores alone or in pairs to purchase a small item while asking for cigarettes and to show or not show genuine identification (ID, e.g., driver's license). Unlike federal standards, stores received a second purchase attempt within a few days unless minors were firmly told not to return. Separate violation rates were calculated for first visits, second visits, and either visit. Eleven minors attempted to purchase cigarettes 1,079 times from 671 retail businesses. One sixth of first visits (16.8%) resulted in a violation; the rate was similar for second visits (15.7%). Considering either visit, 25.3% of businesses failed the test. Factors predictive of violation were whether clerks asked for ID, whether the clerks closely examined IDs, and whether minors included snacks or soft drinks in cigarette purchase attempts. A test-retest protocol for estimating underage cigarette sales detected half again as many businesses in violation as the federally approved one-test protocol. Federal policy makers should consider using the test-retest protocol to increase accuracy and awareness of widespread adolescent access to cigarettes through retail businesses.

  15. The Analysis of Two-Way Functional Data Using Two-Way Regularized Singular Value Decompositions

    KAUST Repository

    Huang, Jianhua Z.

    2009-12-01

    Two-way functional data consist of a data matrix whose row and column domains are both structured, for example, temporally or spatially, as when the data are time series collected at different locations in space. We extend one-way functional principal component analysis (PCA) to two-way functional data by introducing regularization of both left and right singular vectors in the singular value decomposition (SVD) of the data matrix. We focus on a penalization approach and solve the nontrivial problem of constructing proper two-way penalties from oneway regression penalties. We introduce conditional cross-validated smoothing parameter selection whereby left-singular vectors are cross- validated conditional on right-singular vectors, and vice versa. The concept can be realized as part of an alternating optimization algorithm. In addition to the penalization approach, we briefly consider two-way regularization with basis expansion. The proposed methods are illustrated with one simulated and two real data examples. Supplemental materials available online show that several "natural" approaches to penalized SVDs are flawed and explain why so. © 2009 American Statistical Association.

  16. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  17. Key Factors Affecting Construction Safety Performance in Developing Countries: Evidence from Cambodia

    Directory of Open Access Journals (Sweden)

    Serdar Durdyev

    2017-12-01

    Full Text Available Although proper safety management in construction is of utmost importance; anecdotal evidence suggests that safety is not adequately considered in many developing countries. This paper considers the key variables affecting construction safety performance in Cambodia. Using an empirical questionnaire survey targeting local construction professionals, respondents were invited to rate the level of importance of 30 variables identified from the seminal literature. The data set was subjected to factor analysis. Correlations between the variables show that five key factors underlie the challenges facing the local industry; management and organisation, resources, site management, cosmetic and workforce. It is found that the forefront construction professionals (top management and government authorities should take more responsibilities for further improvements in safety performance on project sites. Findings and recommendations of this study may be useful to construction professional who are seeking ways to improve safety records in developing countries.

  18. Right-of-way management: A key to controlling the spread of cogograss (Imperata cylindrica)

    Science.gov (United States)

    W.H. Faircloth; M.G. Patterson; James H. Miller; D.H. Teem

    2004-01-01

    Cogongrass [Imperata cylindrica(L.) Beauv.] is an undesired species on highway rights-of-way (ROWS) due to its displacenent of native and/or more manageable grasses, unsightly growth characteristic, and propensity for fire. Fire not only poses a danger to motorists but could cause property loss to adjoining landowners. Most importantly, ROWS provide...

  19. Wind Turbine Contingency Control Through Generator De-Rating

    Science.gov (United States)

    Frost, Susan; Goebel, Kai; Balas, Mark

    2013-01-01

    Maximizing turbine up-time and reducing maintenance costs are key technology drivers for wind turbine operators. Components within wind turbines are subject to considerable stresses due to unpredictable environmental conditions resulting from rapidly changing local dynamics. In that context, systems health management has the aim to assess the state-of-health of components within a wind turbine, to estimate remaining life, and to aid in autonomous decision-making to minimize damage to the turbine. Advanced contingency control is one way to enable autonomous decision-making by providing the mechanism to enable safe and efficient turbine operation. The work reported herein explores the integration of condition monitoring of wind turbines with contingency control to balance the trade-offs between maintaining system health and energy capture. The contingency control involves de-rating the generator operating point to achieve reduced loads on the wind turbine. Results are demonstrated using a high fidelity simulator of a utility-scale wind turbine.

  20. A passionate way of being: A qualitative study revealing the passion spiral

    Directory of Open Access Journals (Sweden)

    Susanna M. Halonen

    2014-06-01

    Full Text Available Being engaged in an activity one is passionate about has been tied to feeling life is worth living for. Existing research in passion has explored this phenomenon purely using quantitative research methodology, and by tying an individual’s passion to a specific activity. In this study, passion was explored in semi-structured interviews with 12 participants. The qualitative grounded theory analysis revealed a passionate way of being, with passion being located in the individual rather than in a specific activity. A new phenomenon to positive psychology, a passionate way of being is about having a purpose, creating positive impact, and pursuing variety. These key elements, amongst others, created a reinforcing, self-sustaining spiral, which offered a route to hedonic and eudaimonic happiness, generally serving to enhance life (though it could also detract from life if it became overpowering.

  1. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    Science.gov (United States)

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  2. Validation of the Peripheral Ultrasound-guided Vascular Access Rating Scale

    DEFF Research Database (Denmark)

    Primdahl, Stine C.; Weile, Jesper; Clemmesen, Louise

    2018-01-01

    rating scale (P =.029, one-way ANOVA), and the P-UGVA rating scale scores also correlated strongly with the overall performance evaluations (rho=0.87, PPearson correlation). We calculated a pass/fail score of 29, which lead to a theoretical false positive rate of 26.5% and false negative rate of 8...

  3. Regeneration of vegetation on wetland crossings for gas pipeline rights-of-way one year after construction

    International Nuclear Information System (INIS)

    Shem, L.M.; Zimmerman, R.E.; Zellmer, S.D.; Van Dyke, G.D.; Rastorfer, J.R.

    1993-01-01

    Four wetland crossings of gas pipeline rights-of-way (ROWs), located in Florida, Michigan, New Jersey, and New York, were surveyed for generation of vegetation roughly one year after pipeline construction was completed. Conventional trench-and-fill construction techniques were employed for all four sites. Estimated areal coverage of each species by vegetative strata within transect plots was recorded for plots on the ROW and in immediately adjacent wetlands undisturbed by construction activities. Relative success of regeneration was measured by percent exposed soil, species diversity, presence of native and introduced species, and hydric characteristics of the vegetation. Variable site factors included separation and replacement of topsoil, final grading of the soil, application of seed and fertilizer, and human disturbance unrelated to construction. Successful regeneration exhibited greater dependency on the first three factors listed

  4. One way to save the number of BPM buttons in the arcs that is not recommended

    International Nuclear Information System (INIS)

    Chao, A.; Kheifets, S.

    1983-12-01

    It has been suggested as a possibility by the beam dynamic task force that the SLC arcs be provided a beam position monitor at every gap between magnets. In this scenario of orbit correction scheme, the BPM's are used alternately for the horizontal and the vertical orbit measurements. One way to construct these BPM's is therefore in the x and y planes. One problem of this construction, as pointed out by Pellegrin and Rees, is that synchrotron radiation will hit the buttons of the x-BPM's. It was suggested then that the x-BPM's should use four buttons, orthogonal, but rotated 45 0 from the x and y planes. This construction requires 4 buttons instead of 2, meaning an increase of cost. As an attempt to reduce the number of buttons needed for arc orbit correction, we have studied a variation of the orbit correction scheme. In this scheme, orbits are not corrected in the x and y coordinates but in the coordinates that are tilted by 45 0 relative to x and y. Let these coordinates be called u and v. The result of the study is that this scheme is not recommended

  5. EXPOSING LEARNERS WITH LEARNING STRATEGIES IN STRATEGY TRAING: ONE OF THE WAYS FOR IMPROVING THEIR STUDY SKILL

    Directory of Open Access Journals (Sweden)

    Kartika Nuswantara

    2009-06-01

    Full Text Available Recognizing our own learning strategies is an effective way to help ourselves to self evaluate for what we have done in our own learning. One among other factors leading to a successful learning is due to the effective learning strategies. However, not all learners are aware of what they have been doing in learning, or they even sometimes do not know how to learn. If this is the problem, learning strategy training can be very beneficial for the learners with this problem. Why should be through strategy training? The answer might lie on the fact that strategy is quite amenable to change, and by nature, teachable as well as learneable (Oxford, 1990. In addition, Nuswantara (2008 also found out that the successful learners (i.e. in learning English were triggered by the courage of using various learning strategies, the more varied the learners are willing to try out, the broader the chance for success. Training is the way that can be selected to present to the learners’ various strategies that they can choose and at the same time employ when learning is taken place. Moreover, by means of training, learners are made aware of the strategy, and they can mend their own strategy, as a result, they become more self - directed rather than dependent. This article attempts to frame out from the perspective of how to bring reading strategies that are applicable for handling various reading content texts to the learners, and present the result of a one-group experimental study. Thus, training is prepared for college learners who are inevitably deal with various English content textbooks and the final aim of the training is to improve learners’ study skills. Then, one group experimental study using correlated sample provides some evidences supporting the effectiveness of the training. Specifying on reading strategies, SQ3R that is joined with other learning strategies involving writing activity, annotating a text and paraphrasing/summarizing is exposed to

  6. Inequalities in neighborhood child asthma admission rates and underlying community characteristics in one US county.

    Science.gov (United States)

    Beck, Andrew F; Moncrief, Terri; Huang, Bin; Simmons, Jeffrey M; Sauers, Hadley; Chen, Chen; Kahn, Robert S

    2013-08-01

    To characterize variation and inequalities in neighborhood child asthma admission rates and to identify associated community factors within one US county. This population-based prospective, observational cohort study consisted of 862 sequential child asthma admissions among 167 653 eligible children ages 1-16 years in Hamilton County, Ohio. Admissions occurred at a tertiary-care pediatric hospital and accounted for nearly 95% of in-county asthma admissions. Neighborhood admission rates were assessed by geocoding addresses to city- and county-defined neighborhoods. The 2010 US Census provided denominator data. Neighborhood admission distribution inequality was assessed by the use of Gini and Robin Hood indices. Associations between neighborhood rates and socioeconomic and environmental factors were assessed using ANOVA and linear regression. The county admission rate was 5.1 per 1000 children. Neighborhood rates varied significantly by quintile: 17.6, 7.7, 4.9, 2.2, and 0.2 admissions per 1000 children (P asthma admission rates varied 88-fold across neighborhood quintiles in one county; a reduction of the county-wide admission rate to that of the bottom quintile would decrease annual admissions from 862 to 34. A rate of zero was present in 15 neighborhoods, which is evidence of what may be attainable. Copyright © 2013 Mosby, Inc. All rights reserved.

  7. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  8. Multi-way Communications: An Information Theoretic Perspective

    KAUST Repository

    Chaaban, Anas

    2015-09-15

    Multi-way communication is a means to significantly improve the spectral efficiency of wireless networks. For instance, in a bi-directional (or two-way) communication channel, two users can simultaneously use the transmission medium to exchange information, thus achieving up to twice the rate that would be achieved had each user transmitted separately. Multi-way communications provides an overview on the developments in this research area since it has been initiated by Shannon. The basic two-way communication channel is considered first, followed by the two-way relay channel obtained by the deployment of an additional cooperative relay node to improve the overall communication performance. This basic setup is then extended to multi-user systems. For all these setups, fundamental limits on the achievable rates are reviewed, thereby making use of a linear high-SNR deterministic channel model to provide valuable insights which are helpful when discussing the coding schemes for Gaussian channel models in detail. Several tools and communication strategies are used in the process, including (but not limited to) computation, signal-space alignment, and nested-lattice codes. Finally, extensions of multi-way communication channels to multiple antenna settings are discussed. © 2015 A. Chaaban and A. Sezgin.

  9. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Science.gov (United States)

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  10. High infection control rate and function after routine one-stage exchange for chronically infected TKA.

    Science.gov (United States)

    Jenny, Jean-Yves; Barbe, Bruno; Gaudias, Jeannot; Boeri, Cyril; Argenson, Jean-Noël

    2013-01-01

    Many surgeons consider two-stage exchange the gold standard for treating chronic infection after TKA. One-stage exchange is an alternative for infection control and might provide better knee function, but the rates of infection control and levels of function are unclear. We asked whether a one-stage exchange protocol would lead to infection control rates and knee function similar to those after two-stage exchange. We followed all 47 patients with chronically infected TKAs treated with one-stage exchange between July 2004 and February 2007. We monitored for recurrence of infection and obtained Knee Society Scores. We followed patients a minimum of 3 years or until death or infection recurrence. Three of the 47 patients (6%) experienced a persistence or recurrence of the index infection with the same pathogen isolated. Three patients (6%) had control of the index infection but between 6 and 17 months experienced an infection with another pathogen. The 3-year survival rates were 87% for being free of any infection and 91% for being healed of the index infection. Twenty-five of the 45 patients (56%) had a Knee Society Score of more than 150 points. While routine one-stage exchange was not associated with a higher rate of infection recurrence failure, knee function was not improved compared to that of historical patients having two-stage exchange. One stage-exchange may be a reasonable alternative in chronically infected TKA as a more convenient approach for patients without the risks of two operations and hospitalizations and for reducing costs. The ideal one stage-exchange candidate should be identified in future studies.

  11. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I.B.; Hickey, T.D.; Morrison, J.M.

    2013-01-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53% greater than winter), and corals in the Dry Tortugas calcified 48% faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the “inimical waters hypothesis” proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification

  12. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I. B.; Hickey, T. D.; Morrison, J. M.

    2013-12-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53 % greater than winter), and corals in the Dry Tortugas calcified 48 % faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the "inimical waters hypothesis" proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification, warming

  13. WAYS TO DECREASE INFANT MORTALITY IN A LARGE AGRO INDUSTRIAL REGION IN RUSSIAN NORTH WEST BASED ON A PROGRAMMED GOAL ORIENTED APPROACH (MATERIALS FROM VOLOGDA REGION

    Directory of Open Access Journals (Sweden)

    V.I. Orel

    2007-01-01

    Full Text Available The authors analyze infant mortality situation in a large agroindustrial region to the north west of Russia. Basing on a programmed goal oriented approach and the example of Vologda region, the authors suggest ways to reduce the sickness rate, perinatal, early neonatal and infant mortality, as well as the methods to improve medical aid to early children.Key words: infant mortality, maternity and infant health protection, sickness rate, organization of health services.

  14. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  15. One-way-coupling simulation of cavitation accompanied by high-speed droplet impact

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Tomoki; Ando, Keita, E-mail: kando@mech.keio.ac.jp [Department of Mechanical Engineering, Keio University, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama 223-8522 (Japan)

    2016-03-15

    Erosion due to high-speed droplet impact is a crucial issue in industrial applications. The erosion is caused by the water-hammer loading on material surfaces and possibly by the reloading from collapsing cavitation bubbles that appear within the droplet. Here, we simulate the dynamics of cavitation bubbles accompanied by high-speed droplet impact against a deformable wall in order to see whether the bubble collapse is violent enough to give rise to cavitation erosion on the wall. The evolution of pressure waves in a single water (or gelatin) droplet to collide with a deformable wall at speed up to 110 m/s is inferred from simulations of multicomponent Euler flow where phase changes are not permitted. Then, we examine the dynamics of cavitation bubbles nucleated from micron/submicron-sized gas bubble nuclei that are supposed to exist inside the droplet. For simplicity, we perform Rayleigh–Plesset-type calculations in a one-way-coupling manner, namely, the bubble dynamics are determined according to the pressure variation obtained from the Euler flow simulation. In the simulation, the preexisting bubble nuclei whose size is either micron or submicron show large growth to submillimeters because tension inside the droplet is obtained through interaction of the pressure waves and the droplet interface; this supports the possibility of having cavitation due to the droplet impact. It is also found, in particular, for the case of cavitation arising from very small nuclei such as nanobubbles, that radiated pressure from the cavitation bubble collapse can overwhelm the water-hammer pressure directly created by the impact. Hence, cavitation may need to be accounted for when it comes to discussing erosion in the droplet impact problem.

  16. Give me five! – reasons for two-way communication between experts and citizens in relation to air pollution risk

    Directory of Open Access Journals (Sweden)

    M. Loroño-Leturiondo

    2018-04-01

    Full Text Available Air pollution is a major environmental concern for many populations worldwide. Communication efforts so far have been based on a one-way provision of evidence and information from experts to society, and have arguably failed in their mission to foster a more aware and engaged society, or to result in cleaner air. Globally we are facing both an air quality crisis and a communication emergency. This paper focuses on the communication of air pollution risk, from the threats it poses (e.g. severe impacts to human health to the opportunities it can create (e.g. behavioural or technological alternatives that lead to cleaner air. It supports the case for moving away from one-way communication, and identifies five key benefits of a practical two-way communication between experts and citizens in order to engender positive change and improve global air quality.

  17. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  18. Performance improvement of coherent free-space optical communication with quadrature phase-shift keying modulation using digital phase estimation.

    Science.gov (United States)

    Li, Xueliang; Geng, Tianwen; Ma, Shuang; Li, Yatian; Gao, Shijie; Wu, Zhiyong

    2017-06-01

    The performance of coherent free-space optical (CFSO) communication with phase modulation is limited by both phase fluctuations and intensity scintillations induced by atmospheric turbulence. To improve the system performance, one effective way is to use digital phase estimation. In this paper, a CFSO communication system with quadrature phase-shift keying modulation is studied. With consideration of the effects of log-normal amplitude fluctuations and Gauss phase fluctuations, a two-stage Mth power carrier phase estimation (CPE) scheme is proposed. The simulation results show that the phase noise can be suppressed greatly by this scheme, and the system symbol error rate performance with the two-stage Mth power CPE can be three orders lower than that of the single-stage Mth power CPE. Therefore, the two-stage CPE we proposed can contribute to the performance improvements of the CFSO communication system and has determinate guidance sense to its actual application.

  19. Knowledge integration in One Health policy formulation, implementation and evaluation.

    Science.gov (United States)

    Hitziger, Martin; Esposito, Roberto; Canali, Massimo; Aragrande, Maurizio; Häsler, Barbara; Rüegg, Simon R

    2018-03-01

    The One Health concept covers the interrelationship between human, animal and environmental health and requires multistakeholder collaboration across many cultural, disciplinary, institutional and sectoral boundaries. Yet, the implementation of the One Health approach appears hampered by shortcomings in the global framework for health governance. Knowledge integration approaches, at all stages of policy development, could help to address these shortcomings. The identification of key objectives, the resolving of trade-offs and the creation of a common vision and a common direction can be supported by multicriteria analyses. Evidence-based decision-making and transformation of observations into narratives detailing how situations emerge and might unfold in the future can be achieved by systems thinking. Finally, transdisciplinary approaches can be used both to improve the effectiveness of existing systems and to develop novel networks for collective action. To strengthen One Health governance, we propose that knowledge integration becomes a key feature of all stages in the development of related policies. We suggest several ways in which such integration could be promoted.

  20. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  1. On Determinism and Unambiguity of Weighted Two-way Automata

    Directory of Open Access Journals (Sweden)

    Vincent Carnino

    2014-05-01

    Full Text Available In this paper, we first study the conversion of weighted two-way automata to one-way automata. We show that this conversion preserves the unambiguity but does not preserve the determinism. Yet, we prove that the conversion of an unambiguous weighted one-way automaton into a two-way automaton leads to a deterministic two-way automaton. As a consequence, we prove that unambiguous weighted two-way automata are equivalent to deterministic weighted two-way automata in commutative semirings.

  2. The Impact of Key Monetary Variables on the Economic Growth of the CEMAC Zone

    Directory of Open Access Journals (Sweden)

    Forgha Godfrey NJIMANTED

    2016-09-01

    Full Text Available This study seeks to empirically explore the impact of key monetary policy variables on the economic growth in the CEMAC zone from the period of 1981 to 2015. Carried out using the Ex post facto research design based on the principal components selection approach, the study interacts money supply, interest rate, economic growth, and inflation rate, among themselves and their lagged values using the Vector Auto-regressive (VAR analytical technique. The Classical quantity theory of money, the Cambridge Cash Balanced, the liquidity preference theory and the Monetarists as theoretical frameworks were explored to appreciate the time trends of the selected variables on the economic growth of the CEMAC zone. Based on the (VAR methodology, the study reveals that key monetary policy variables influence economic growth of the CEMAC zone in different ways with inflation rate as the impact factor. On the basis of the above findings and the evidence from other studies, lending and inflation rate generated substantial destabilizing impacts on the economic growth, suggesting that the monetary authorities should play a critical role in creating an enabling environment for growth. The determination of the optimal lending rate should reflect the overall internal rate of returns in the productive sectors with due attention to market fundamentals. In line with this, the Central Bank of CEMAC should be given complete instrumental autonomy to operate depending on a set of in-built targets by the individual countries of the zone. Effective monetary targeting and accommodating monetary policies should be designed and implemented as the need arises with little or no political motives.

  3. The Roland De Witte Experiment, R. T. Cahill, and the One-Way Speed of Light (Letters to Progress in Physics

    Directory of Open Access Journals (Sweden)

    Catania J.

    2016-01-01

    Full Text Available In “The Roland De Witte 1991 Experiment (to the Memory of Roland De Witte” (Progr. Phys , 2006, v. 2(3, 60–65, R.T. Cahill gives us a briefing on his view that interferometer measurements and one-way RF coaxial cable propagation-time measure- ments amount to a detection of the anisotropy in the speed of light. However, while I obtain first order propagation delays in calculations for on e-way transit which would show geometric modulation by Earth’s rotation, I do not agree with Cahill’s simplistic equation that relates the modulation solely to the projection of the absolute velocity vector v on the coaxial cable, called v P by Cahill (ibid., p. 61–62. The reader should be warned that Cahill’s equation for ∆ t (ibid., p.63 is crude compared with a full Special Relativistic derivation.

  4. Topologically protected one-way edge mode in networks of acoustic resonators with circulating air flow

    International Nuclear Information System (INIS)

    Ni, Xu; He, Cheng; Sun, Xiao-Chen; Liu, Xiao-ping; Lu, Ming-Hui; Chen, Yan-Feng; Feng, Liang

    2015-01-01

    Recent explorations of topology in physical systems have led to a new paradigm of condensed matters characterized by topologically protected states and phase transition, for example, topologically protected photonic crystals enabled by magneto-optical effects. However, in other wave systems such as acoustics, topological states cannot be simply reproduced due to the absence of similar magnetics-related sound–matter interactions in naturally available materials. Here, we propose an acoustic topological structure by creating an effective gauge magnetic field for sound using circularly flowing air in the designed acoustic ring resonators. The created gauge magnetic field breaks the time-reversal symmetry, and therefore topological properties can be designed to be nontrivial with non-zero Chern numbers and thus to enable a topological sonic crystal, in which the topologically protected acoustic edge-state transport is observed, featuring robust one-way propagation characteristics against a variety of topological defects and impurities. Our results open a new venue to non-magnetic topological structures and promise a unique approach to effective manipulation of acoustic interfacial transport at will. (paper)

  5. Evaluating the far-field sound of a turbulent jet with one-way Navier-Stokes equations

    Science.gov (United States)

    Pickering, Ethan; Rigas, Georgios; Towne, Aaron; Colonius, Tim

    2017-11-01

    The one-way Navier-Stokes (OWNS) method has shown promising ability to predict both near field coherent structures (i.e. wave packets) and far field acoustics of turbulent jets while remaining computationally efficient through implementation of a spatial marching scheme. Considering the speed and relative accuracy of OWNS, a predictive model for various jet configurations may be conceived and applied for noise control. However, there still remain discrepancies between OWNS and large eddy simulation (LES) databases which may be linked to the previous neglect of nonlinear forcing. Therefore, to better predict wave packets and far field acoustics, this study investigates the effect of nonlinear forcing terms derived from high-fidelity LES databases. The results of the nonlinear forcings are evaluated for several azimuthal modes and frequencies, as well as compared to LES derived acoustics using spectral proper orthogonal decomposition (SPOD). This research was supported by the Department of Defense (DoD) through the Office of Naval Research (Grant No. N00014-16-1-2445) and the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  6. MODERN PROBLEMS AND WAYS OF DEVELOPMENT OF COOPERATION

    Directory of Open Access Journals (Sweden)

    Mishchenko Tatyana Leonidovna

    2013-01-01

    Full Text Available The article discusses the importance of cooperation on the current economic stage as one of the forms of cooperation in the arena of the market of small, medium and large businesses. The aim of this work is the study of contemporary problems of agricultural co-operation and development of effective ways of functioning of the cooperative sector, which is a sustainable development factor of socio-economic systems, contributes to the protection of the interests of its participants, increasing of competitiveness at the industry and national markets. In compliance of the objectives outlined the following objectives of its decision: - to justify the relevance of research in modern Economics; - to analyze the economic interdependence of market subjects and their effectiveness in key financial indicators; - identify the causes, constraining the effective development of the cooperative forms of management. The scientific novelty of the results of the study consists of the following: - it is proved that the basic idea of the cooperative movement is a transition from small businesses to large-scale activity, which today has a real embodiment in life; - it is proved that co-operation is a key element of sustainable development of rural areas and market institutions and is based on a solid social base of farms, individual farms; - as a result of the carried out estimation of parameters of functioning of the agrarian market subjects, proposed an alternative way of economic interaction of participants of the cooperative company. As a conclusion it should be noted that the development of the cooperative sector in economic realities increases significantly in the conditions of Russia's accession to the WTO, ensuring competitiveness of the domestic products and first of all the country's food security.

  7. MODERN PROBLEMS AND WAYS OF DEVELOPMENT OF COOPERATION

    Directory of Open Access Journals (Sweden)

    Татьяна Леонидовна Мищенко

    2013-04-01

    Full Text Available The article discusses the importance of cooperation on the current economic stage as one of the forms of cooperation in the arena of the market of small, medium and large businesses. The aim of this work is the study of contemporary problems of agricultural co-operation and development of effective ways of functioning of the cooperative sector, which is a sustainable development factor of socio-economic systems, contributes to the protection of the interests of its participants, increasing of competitiveness at the industry and national markets. In compliance of the objectives outlined the following objectives of its decision:- to justify the relevance of research in modern Economics;- to analyze the economic interdependence of market subjects and their effectiveness in key financial indicators;- identify the causes, constraining the effective development of the cooperative forms of management.The scientific novelty of the results of the study consists of the following:- it is proved that the basic idea of the cooperative movement is a transition from small businesses to large-scale activity, which today has a real embodiment in life;- it is proved that co-operation is a key element of sustainable development of rural areas and market institutions and is based on a solid social base of farms, individual farms;- as a result of the carried out estimation of parameters of functioning of the agrarian market subjects, proposed an alternative way of economic interaction of participants of the cooperative company. As a conclusion it should be noted that the development of the cooperative sector in economic realities increases significantly in the conditions of Russia's accession to the WTO, ensuring competitiveness of the domestic products and first of all the country's food security.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-28

  8. Recognition and cinema: new ways of approaching

    Directory of Open Access Journals (Sweden)

    José Luis GARCÍA MARTÍNEZ

    2016-09-01

    Full Text Available Along the following lines we propose the use of films for educational purposes. Our main argument, based on philosophical grounds, shows the use of film format to emphasize and understand people’s motivations and actions. The reflections brought about by empathy with the characters are the first step in the approach of the topic of recognition, a term that in the medical framework involves taking into account the various aspects of inter-human relationships. Recognition of “the other” as he/she stands, implies addressing differences and providing a better doctor-patient relationship. The analysis of several films might encourage the acknowledgement of recognition as one of the key concepts to understand our ways of relating within plural societies with different lifestyles and different outlooks on the world. We believe that the effort made in dealing with such topics results in greater closeness to the patient and, therefore, better care.

  9. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  10. Easements, MDTA Right of Way Easement, Right of Way Easement, Right of Way Easement on I 95, Fort McHenry Tunnel, Baltimore Harbor tunnel, Francis Scott Key Bridge, Published in 2010, 1:1200 (1in=100ft) scale, Maryland Transportation Authority.

    Data.gov (United States)

    NSGIC State | GIS Inventory — Easements dataset current as of 2010. MDTA Right of Way Easement, Right of Way Easement, Right of Way Easement on I 95, Fort McHenry Tunnel, Baltimore Harbor tunnel,...

  11. Possible way to check up superbanana transport effects in present-day stellarators

    International Nuclear Information System (INIS)

    Bykov, V.E.; Volkov, E.D.; Georgievskij, A.V.; Shishkin, A.A.

    1986-01-01

    An important, as yet unanswered question in stellarator research is the following: how dangerous is the superbanana transport to the plasma confinement? Comparison of experimental data with theoretical transport coefficients indicates that the superbanana transport does occur in experiments. But it is believed that the experimental plasma loss rates (W-VIIA) are considerably lower than those predicted by neoclassical theory. The existing inconsistencies make it necessary to search for additional ways to find out whether the superbanana transport is feasible. One of possible ways is connected with the fact that the neoclassical superbanana transport coefficients depend essentially on the harmonic composition of the magnetic field

  12. Strategizing in multiple ways

    DEFF Research Database (Denmark)

    Larsen, Mette Vinther; Madsen, Charlotte Øland; Rasmussen, Jørgen Gulddahl

    2013-01-01

    Strategy processes are kinds of wayfaring where different actors interpret a formally defined strat-egy differently. In the everyday practice of organizations strategizing takes place in multiple ways through narratives and sensible actions. This forms a meshwork of polyphonic ways to enact one...... and the same strategy. The paper focusses on such processes as they develop in a Danish service company. It is done on the basis of an empirical and longitudinal study of a strategy process in the Service Company where the strategic purpose was to implement value-based management. The theme to be developed...... based on this development paper is whether one can understand these diver-gent strategic wayfaring processes as constructive for organizations....

  13. 100 ways to make good photos great tips & techniques for improving your digital photography

    CERN Document Server

    Cope, Peter

    2013-01-01

    A practical, accessible guide to turning your good photographs into great ones whether you are shooting on the latest digital SLR or a camera phone! Discover 100 simple and fun ways to improve your photographs both in-camera and through post-processing image manipulation. Every key photographic genre is covered, from perfect portraits and the great outdoors, to travel photos and shooting at night. Filled with inspirational examples of great photographs compared against the more average images, with easy to follow techniques for how you can achieve the same results.

  14. Water chemistry - one of the key technologies for safe and reliable nuclear power plant operation

    International Nuclear Information System (INIS)

    Uchida, S.; Otoha, K.; Ishigure, K.

    2006-01-01

    Full text: Full text: Water chemistry control is one of the key technologies to establish safe and reliable operation of nuclear power plants. Continuous and collaborative efforts of plant manufacturers and plant operator utilities have been focused on optimal water chemistry control, for which, a trio of requirements for water chemistry, a) better reliability of reactor structures and fuels, b) lower occupational exposure, and c) fewer radwaste sources, should be simultaneously satisfied. The research committee related to water chemistry of the Atomic Energy Society of Japan has played important roles to enhance improvement in water chemistry control, to share knowledge and experience with water chemistry among plant operators and manufacturers, to establish common technological bases for plant water chemistry and then to transfer them to the next generation related to water chemistry. Furthermore, the committee has tried to contribute to arranging R and D proposals for further improvement in water chemistry control through road map planning

  15. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  16. Key requirements for high quality picture-rate conversion.

    NARCIS (Netherlands)

    Cordes, C.N.; Haan, de G.

    2009-01-01

    Past LCD-TV generations suffered from a poor motion portrayal, causing the blurring of moving objects. Hence, various techniques have been implemented to improve their motion portrayal, of which the widespread introduction of motion compensated picture-rate conversion in TV systems is an essential

  17. Fish ladder of Lajeado Dam: migrations on one-way routes?

    Directory of Open Access Journals (Sweden)

    Angelo Antônio Agostinho

    half of the reservoir; those found in water flowing through the spillways, turbines or fish ladder of Lajeado Dam belonged essentially to non-migratory clupeids that spawn in the inner part of the reservoir. In addition, results showed that in a reservoir with no fish-passage mechanism, migrants select habitats that still maintain riverine characteristics, in the upper parts of the impounded area. The downward movements are negligible compared to those upward, in the experiments conducted in the fish ladder. It is concluded, therefore, that the Lajeado fish ladder, and possibly those at other dams, is essentially a one-way route that promotes upstream movements of migrants, without the necessary return of adults or their offspring. Thus, the low permeability of the connections provided by these management tools can drastically increase the level of environmental impact that they were actually intended to reduce.

  18. Tartaric acid in red wine as one of the key factors to induce superconductivity in FeTe0.8S0.2

    Science.gov (United States)

    Deguchi, Keita; Okuda, Tohru; Hara, Hiroshi; Demura, Satoshi; Watanabe, Tohru; Okazaki, Hiroyuki; Fujioka, Masaya; Denholme, Saleem James; Ozaki, Toshinori; Yamaguchi, Takahide; Takeya, Hiroyuki; Saito, Fumie; Hisamoto, Masashi; Takano, Yoshihiko

    2013-04-01

    We investigated the key factor of superconductivity in FeTe1-xSx induced by alcoholic beverages. To understand the reason why red wine shows larger shielding volume fraction than the other alcoholic beverages, the red wine dependence of superconductivity was performed. All the samples heated in red wine made from different grapes shows large shielding volume fraction compared with the samples heated in water and other alcoholic beverages. The shielding volume fraction of the red wine samples is proportional to the concentration of tartaric acid. We found that tartaric acid is one of the key factors to induce superconductivity in FeTe1-xSx.

  19. Analisis Studi Komperatif Perbandingan Key Performance Index Swap Huawei dengan Nokia Siemens Network pada Operator Telkomsel (Sto Tebas)

    OpenAIRE

    Jimmy

    2015-01-01

    – The need for telecommunications is very important and makes the mobile operators including Telkomsel are trying ways to improvise their network system, by optimizing the BTSs one of way is to maintain and even increase the success call rate by optimizing the device by swapping Huawei BTS to Nokia Siemens Network (NSN) BTS. The results of the KPI comparison between the Huawei's BTS with Nokia Siemens Network's on the SDSR on Huawei BTS percentage of success rate is 99.59% raised calls is hig...

  20. A simulation of the Four-way lunar Lander-Orbiter tracking mode for the Chang'E-5 mission

    Science.gov (United States)

    Li, Fei; Ye, Mao; Yan, Jianguo; Hao, Weifeng; Barriot, Jean-Pierre

    2016-06-01

    The Chang'E-5 mission is the third phase of the Chinese Lunar Exploration Program and will collect and return lunar samples. After sampling, the Orbiter and the ascent vehicle will rendezvous and dock, and both spacecraft will require high precision orbit navigation. In this paper, we present a novel tracking mode-Four-way lunar Lander-Orbiter tracking that possibly can be employed during the Chang'E-5 mission. The mathematical formulas for the Four-way lunar Lander-Orbiter tracking mode are given and implemented in our newly-designed lunar spacecraft orbit determination and gravity field recovery software, the LUnar Gravity REcovery and Analysis Software/System (LUGREAS). The simulated observables permit analysis of the potential contribution Four-way lunar Lander-Orbiter tracking could make to precision orbit determination for the Orbiter. Our results show that the Four-way lunar Lander-Orbiter Range Rate has better geometric constraint on the orbit, and is more sensitive than the traditional two-way range rate that only tracks data between the Earth station and lunar Orbiter. After combining the Four-way lunar Lander-Orbiter Range Rate data with the traditional two-way range rate data and considering the Lander position error and lunar gravity field error, the accuracy of precision orbit determination for the Orbiter in the simulation was improved significantly, with the biggest improvement being one order of magnitude, and the Lander position could be constrained to sub-meter level. This new tracking mode could provide a reference for the Chang'E-5 mission and have enormous potential for the positioning of future lunar farside Lander due to its relay characteristic.

  1. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  2. One-Way Quantum Authenticated Secure Communication Using Rotation Operation

    International Nuclear Information System (INIS)

    Tsai Chia-Wei; Wei Toung-Shang; Hwang Tzonelih

    2011-01-01

    This study proposes a theoretical quantum authenticated secure communication (QASC) protocol using Einstein-Podolsky-Rosen (EPR) entangle state, which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. (general)

  3. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  4. Effect of non-normality on test statistics for one-way independent groups designs.

    Science.gov (United States)

    Cribbie, Robert A; Fiksenbaum, Lisa; Keselman, H J; Wilcox, Rand R

    2012-02-01

    The data obtained from one-way independent groups designs is typically non-normal in form and rarely equally variable across treatment populations (i.e., population variances are heterogeneous). Consequently, the classical test statistic that is used to assess statistical significance (i.e., the analysis of variance F test) typically provides invalid results (e.g., too many Type I errors, reduced power). For this reason, there has been considerable interest in finding a test statistic that is appropriate under conditions of non-normality and variance heterogeneity. Previously recommended procedures for analysing such data include the James test, the Welch test applied either to the usual least squares estimators of central tendency and variability, or the Welch test with robust estimators (i.e., trimmed means and Winsorized variances). A new statistic proposed by Krishnamoorthy, Lu, and Mathew, intended to deal with heterogeneous variances, though not non-normality, uses a parametric bootstrap procedure. In their investigation of the parametric bootstrap test, the authors examined its operating characteristics under limited conditions and did not compare it to the Welch test based on robust estimators. Thus, we investigated how the parametric bootstrap procedure and a modified parametric bootstrap procedure based on trimmed means perform relative to previously recommended procedures when data are non-normal and heterogeneous. The results indicated that the tests based on trimmed means offer the best Type I error control and power when variances are unequal and at least some of the distribution shapes are non-normal. © 2011 The British Psychological Society.

  5. Analysis of Secret Key Randomness Exploiting the Radio Channel Variability

    Directory of Open Access Journals (Sweden)

    Taghrid Mazloum

    2015-01-01

    Full Text Available A few years ago, physical layer based techniques have started to be considered as a way to improve security in wireless communications. A well known problem is the management of ciphering keys, both regarding the generation and distribution of these keys. A way to alleviate such difficulties is to use a common source of randomness for the legitimate terminals, not accessible to an eavesdropper. This is the case of the fading propagation channel, when exact or approximate reciprocity applies. Although this principle has been known for long, not so many works have evaluated the effect of radio channel properties in practical environments on the degree of randomness of the generated keys. To this end, we here investigate indoor radio channel measurements in different environments and settings at either 2.4625 GHz or 5.4 GHz band, of particular interest for WIFI related standards. Key bits are extracted by quantizing the complex channel coefficients and their randomness is evaluated using the NIST test suite. We then look at the impact of the carrier frequency, the channel variability in the space, time, and frequency degrees of freedom used to construct a long secret key, in relation to the nature of the radio environment such as the LOS/NLOS character.

  6. Physiological responses of batsmen during a simulated One Day ...

    African Journals Online (AJOL)

    Methods: Seventeen male batsmen from the Rhodes University ... was reported that during an ODI game, batsmen had sweat rates, ... respiratory exchange ratio of 1.05 and an energy cost of 2536 kJ.h-1. .... large.[13] A one-way analysis of variance was .... the case in this study as there was a significant (p<0.05) increase in.

  7. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  8. Practical round-robin differential-phase-shift quantum key distribution

    International Nuclear Information System (INIS)

    Zhang, Zhen; Yuan, Xiao; Cao, Zhu; Ma, Xiongfeng

    2017-01-01

    The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shift QKD protocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice. (paper)

  9. Performing Archives: Reflections on Ways of not Being Dead in Public

    Directory of Open Access Journals (Sweden)

    Óscar Cornago

    2014-12-01

    Full Text Available The multiplication of the archives, as cultural practices and as a theoretical framework, has grown at the same rate as the suspicion about its usefulness. This paper proposes the idea of «performing archives» as a reaction to this suspicion. Through the concept of archive in Foucault and Agamben, on the one hand, and the Affects Archive project, on the other, different ways of understanding the performative dimension of archive are discussed.

  10. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  11. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  12. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  13. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  14. Identification of key target markets for intermodal freight transport solutions in South Africa

    Directory of Open Access Journals (Sweden)

    Joubert van Eeden

    2010-11-01

    Full Text Available The Accelerated and Shared Growth Initiative for South Africa (AsgiSA identified South Africa's freight logistics challenges as among the key binding constraints on the country's growth aspirations. The research presented here points to the structural imbalance between road and rail freight transport as one of the key contributors to this state of affairs. Most long-distance corridor transport has been captured by road. However, long-distance transport is a market segment that is very suitable for intermodal transportation : rail is utilised for the high-density, long-distance component and road for the feeder and distribution services at the corridor end points. A market segmentation approach is developed to identify the corridors and industries that are natural candidates for such solutions, thereby paving the way for role-players and stakeholders to initiate a dialogue on the development of appropriate solutions.

  15. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    Dudar, R.; McIntyre, J.; McInnes, B.P.

    1994-01-01

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  16. Impact of standard rate of VAT on tax mix in EU 27

    Directory of Open Access Journals (Sweden)

    Tereza Šinkyříková

    2012-01-01

    Full Text Available The Value Added Tax (VAT is one of the key resources within tax collection and therefore VAT effectiveness and VAT complexity represent one of the current world topics. Standard rates of VAT may and may not be the simple key to define whether VAT is important in the tax mix or not. This paper focuses on the question whether the amount of the VAT rate has an impact on the share of VAT in the tax mix. The VAT share on total taxes is studied in connection of average and median standard rates applied so as to answer the question: “Do the countries with higher share of VAT in the tax mix set its standard rates of VAT beyond the average of EU 27?” The paper examines this issue using data EU member countries, especially EU 27, in years 1995–2010.

  17. Controlled-source seismic interferometry with one way wave fields

    Science.gov (United States)

    van der Neut, J.; Wapenaar, K.; Thorbecke, J. W.

    2008-12-01

    In Seismic Interferometry we generally cross-correlate registrations at two receiver locations and sum over an array of sources to retrieve a Green's function as if one of the receiver locations hosts a (virtual) source and the other receiver location hosts an actual receiver. One application of this concept is to redatum an area of surface sources to a downhole receiver location, without requiring information about the medium between the sources and receivers, thus providing an effective tool for imaging below complex overburden, which is also known as the Virtual Source method. We demonstrate how elastic wavefield decomposition can be effectively combined with controlled-source Seismic Interferometry to generate virtual sources in a downhole receiver array that radiate only down- or upgoing P- or S-waves with receivers sensing only down- or upgoing P- or S- waves. For this purpose we derive exact Green's matrix representations from a reciprocity theorem for decomposed wavefields. Required is the deployment of multi-component sources at the surface and multi- component receivers in a horizontal borehole. The theory is supported with a synthetic elastic model, where redatumed traces are compared with those of a directly modeled reflection response, generated by placing active sources at the virtual source locations and applying elastic wavefield decomposition on both source and receiver side.

  18. ASTROBIOLOGICAL EFFECTS OF GAMMA-RAY BURSTS IN THE MILKY WAY GALAXY

    International Nuclear Information System (INIS)

    Gowanlock, Michael G.

    2016-01-01

    A planet having protective ozone within the collimated beam of a gamma-ray burst (GRB) may suffer ozone depletion, potentially causing a mass extinction event to existing life on a planet’s surface and oceans. We model the dangers of long GRBs to planets in the Milky Way and utilize a static statistical model of the Galaxy, which matches major observable properties, such as the inside-out star formation history (SFH), metallicity evolution, and three-dimensional stellar number density distribution. The GRB formation rate is a function of both the SFH and metallicity. However, the extent to which chemical evolution reduces the GRB rate over time in the Milky Way is still an open question. Therefore, we compare the damaging effects of GRBs to biospheres in the Milky Way using two models. One model generates GRBs as a function of the inside-out SFH. The other model follows the SFH, but generates GRB progenitors as a function of metallicity, thereby favoring metal-poor host regions of the Galaxy over time. If the GRB rate only follows the SFH, the majority of the GRBs occur in the inner Galaxy. However, if GRB progenitors are constrained to low-metallicity environments, then GRBs only form in the metal-poor outskirts at recent epochs. Interestingly, over the past 1 Gyr, the surface density of stars (and their corresponding planets), which survive a GRB is still greatest in the inner galaxy in both models. The present-day danger of long GRBs to life at the solar radius ( R ⊙ = 8 kpc) is low. We find that at least ∼65% of stars survive a GRB over the past 1 Gyr. Furthermore, when the GRB rate was expected to have been enhanced at higher redshifts, such as z ≳ 0.5, our results suggest that a large fraction of planets would have survived these lethal GRB events.

  19. ERP as an organization innovation : Key users and cross-boundary knowledge management

    NARCIS (Netherlands)

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  20. What are key determinants of hospital admissions, readmission rate and day case rate within the South African medical schemes population?

    Directory of Open Access Journals (Sweden)

    Nondumiso Gugu Khumalo

    2012-06-01

    Full Text Available  BACKGROUND: In South Africa, private hospitals absorb a high proportion of the total health expenditure on private health care. Between 2008-2010 private hospital expenditure which includes ward fees, theatre fees, consumables, medicines and per diem arrangements consumed between 40.5% and 40.9% of the total benefits paid by medical schemes from the risk pool, whilst in-hospital managed care fees ranged between 1.8% and 2.8% for the equivalent years.OBJECTIVE: The aim of this paper is to highlight key factors contributing to utilisation of hospital services within the medical schemes population and to recommend “appropriate” and cost effective strategies on hospital utilisation management.METHODS: A cross sectional survey informed by retrospective analysis of quantitative data was used. Researchers also triangulated quantitative data with systematic review of literature.RESULTS: The results show that demographic indicators such as age profile, dependency ratio, pensioner ratio and prevalence of chronic conditions are not the only key factors influencing hospital admissions, but rather the effectiveness of each medical scheme in containing hospital admissions is also influenced by available technical capacity on utilisation review and audit as well as the managed care methodology including the philosophy underpinning benefit option design.CONCLUSION: This study highlights the importance of “value based” managed care programs linked to benefit option design in health care utilisation management. The choice of one managed care program over the other often leads to tradeoffs whereby unintended consequences emanate. Medical schemes are therefore encouraged to continuously review their managed care programs to ensure value for money as well as better access and health outcomes.http://dx.doi.org/10.7175/fe.v13i2.207

  1. Development of key performance indicators for prehospital emergency care.

    Science.gov (United States)

    Murphy, Adrian; Wakai, Abel; Walsh, Cathal; Cummins, Fergal; O'Sullivan, Ronan

    2016-04-01

    Key performance indicators (KPIs) are used to monitor and evaluate critical areas of clinical and support functions that influence patient outcome. Traditional prehospital emergency care performance monitoring has focused solely on response time metrics. The landscape of emergency care delivery in Ireland is in the process of significant national reconfiguration. The development of KPIs is therefore considered one of the key priorities in prehospital research. The aim of this study was to develop a suite of KPIs for prehospital emergency care in Ireland. A systematic literature review of prehospital care performance measurement was undertaken followed by a three-round Delphi consensus process facilitated by a broad-based multidisciplinary group of panellists. The consensus process was conducted between June 2012 and October 2013. Each candidate indicator on the Delphi survey questionnaire was rated using a 5-point Likert-type rating scale. Agreement was defined as at least 70% of responders rating an indicator as 'agree' or 'strongly agree' on the rating scale. Data were analysed using descriptive statistics. Sensitivity of the ratings was examined for robustness by bootstrapping the original sample. Of the 78 citations identified by the systematic review, 5 relevant publications were used to select candidate indicators for the Delphi round 1 questionnaire. Response rates in Delphi rounds 1 and 2 were 89% and 83%, respectively. Following the consensus development conference, 101 KPIs reached consensus. Based on the Donabedian framework for quality-of-care indicators, 7 of the KPIs which reached agreement were structure KPIs, 74 were process KPIs and 20 were outcome KPIs. The highest ranked indicator was a process KPI ('Direct transport of ST-elevation myocardial infarction patients to a primary percutaneous intervention (PCI)-capable facility for ECG to PCI time performance measurement using scientifically valid and reliable KPIs. Employing a Delphi panel of key

  2. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  3. The Way in Which Leadership Is Conceived

    Science.gov (United States)

    Ryan, Jim

    2010-01-01

    There are many important priorities for leadership education in a democratic society. In this article, the author concentrates on just one--the way in which leadership is conceived. This is an important issue. Indeed, the way in which potential leaders perceive leadership will shape the way in which they eventually practice it. The problem to date…

  4. Robust Inference with Multi-way Clustering

    OpenAIRE

    A. Colin Cameron; Jonah B. Gelbach; Douglas L. Miller; Doug Miller

    2009-01-01

    In this paper we propose a variance estimator for the OLS estimator as well as for nonlinear estimators such as logit, probit and GMM. This variance estimator enables cluster-robust inference when there is two-way or multi-way clustering that is non-nested. The variance estimator extends the standard cluster-robust variance estimator or sandwich estimator for one-way clustering (e.g. Liang and Zeger (1986), Arellano (1987)) and relies on similar relatively weak distributional assumptions. Our...

  5. The COS/UVES absorption survey of the Magellanic stream. III. Ionization, total mass, and inflow rate onto the Milky Way

    International Nuclear Information System (INIS)

    Fox, Andrew J.; Thom, Christopher; Tumlinson, Jason; Ely, Justin; Kumari, Nimisha; Wakker, Bart P.; Hernandez, Audra K.; Haffner, L. Matthew; Barger, Kathleen A.; Lehner, Nicolas; Howk, J. Christopher; Richter, Philipp; Bland-Hawthorn, Joss; Charlton, Jane C.; Westmeier, Tobias; Misawa, Toru; Rodriguez-Hidalgo, Paola

    2014-01-01

    Dynamic interactions between the two Magellanic Clouds have flung large quantities of gas into the halo of the Milky Way. The result is a spectacular arrangement of gaseous structures, including the Magellanic Stream, the Magellanic Bridge, and the Leading Arm (collectively referred to as the Magellanic System). In this third paper of a series studying the Magellanic gas in absorption, we analyze the gas ionization level using a sample of 69 Hubble Space Telescope/Cosmic Origins Spectrograph sightlines that pass through or within 30° of the 21 cm emitting regions. We find that 81% (56/69) of the sightlines show UV absorption at Magellanic velocities, indicating that the total cross-section of the Magellanic System is ≈11,000 deg 2 , or around one-quarter of the entire sky. Using observations of the Si III/Si II ratio together with Cloudy photoionization modeling, we calculate the total gas mass (atomic plus ionized) of the Magellanic System to be ≈2.0 × 10 9 M ☉ (d/55 kpc) 2 , with the ionized gas contributing around three times as much mass as the atomic gas. This is larger than the current-day interstellar H I mass of both Magellanic Clouds combined, indicating that they have lost most of their initial gas mass. If the gas in the Magellanic System survives to reach the Galactic disk over its inflow time of ∼0.5-1.0 Gyr, it will represent an average inflow rate of ∼3.7-6.7 M ☉ yr –1 , potentially raising the Galactic star formation rate. However, multiple signs of an evaporative interaction with the hot Galactic corona indicate that the Magellanic gas may not survive its journey to the disk fully intact and will instead add material to (and cool) the corona.

  6. The COS/UVES absorption survey of the Magellanic stream. III. Ionization, total mass, and inflow rate onto the Milky Way

    Energy Technology Data Exchange (ETDEWEB)

    Fox, Andrew J.; Thom, Christopher; Tumlinson, Jason; Ely, Justin; Kumari, Nimisha [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Wakker, Bart P.; Hernandez, Audra K.; Haffner, L. Matthew [Department of Astronomy, University of Wisconsin-Madison, 475 North Charter Street, Madison, WI 53706 (United States); Barger, Kathleen A.; Lehner, Nicolas; Howk, J. Christopher [Department of Physics, University of Notre Dame, 225 Nieuwland Science Hall, Notre Dame, IN 46556 (United States); Richter, Philipp [Institut für Physik und Astronomie, Universität Potsdam, Haus 28, Karl-Liebknecht-Strasse 24/25, D-14476, Potsdam (Germany); Bland-Hawthorn, Joss [Institute of Astronomy, School of Physics, University of Sydney, Sydney, NSW 2006 (Australia); Charlton, Jane C. [Department of Astronomy and Astrophysics, Pennsylvania State University, University Park, PA 16802 (United States); Westmeier, Tobias [ICRAR, The University of Western Australia, 35 Stirling Highway, Crawley, WA 6009 (Australia); Misawa, Toru [School of General Education, Shinshu University, 3-1-1 Asahi, Matsumoto, Nagano 390-8621 (Japan); Rodriguez-Hidalgo, Paola, E-mail: afox@stsci.edu [Department of Physics and Astronomy, York University, 4700 Keele Street, Toronto, ON M3J 1P3 (Canada)

    2014-06-01

    Dynamic interactions between the two Magellanic Clouds have flung large quantities of gas into the halo of the Milky Way. The result is a spectacular arrangement of gaseous structures, including the Magellanic Stream, the Magellanic Bridge, and the Leading Arm (collectively referred to as the Magellanic System). In this third paper of a series studying the Magellanic gas in absorption, we analyze the gas ionization level using a sample of 69 Hubble Space Telescope/Cosmic Origins Spectrograph sightlines that pass through or within 30° of the 21 cm emitting regions. We find that 81% (56/69) of the sightlines show UV absorption at Magellanic velocities, indicating that the total cross-section of the Magellanic System is ≈11,000 deg{sup 2}, or around one-quarter of the entire sky. Using observations of the Si III/Si II ratio together with Cloudy photoionization modeling, we calculate the total gas mass (atomic plus ionized) of the Magellanic System to be ≈2.0 × 10{sup 9} M {sub ☉} (d/55 kpc){sup 2}, with the ionized gas contributing around three times as much mass as the atomic gas. This is larger than the current-day interstellar H I mass of both Magellanic Clouds combined, indicating that they have lost most of their initial gas mass. If the gas in the Magellanic System survives to reach the Galactic disk over its inflow time of ∼0.5-1.0 Gyr, it will represent an average inflow rate of ∼3.7-6.7 M {sub ☉} yr{sup –1}, potentially raising the Galactic star formation rate. However, multiple signs of an evaporative interaction with the hot Galactic corona indicate that the Magellanic gas may not survive its journey to the disk fully intact and will instead add material to (and cool) the corona.

  7. Interconnection of the Keys north of the country with the National Electro energetic System (SEN) through a submarine cable

    International Nuclear Information System (INIS)

    Sánchez Yañez, Pablo

    2017-01-01

    Most of the keys of the north of the country have a high potential for tourism Sun and beach, which is why each has an associated infrastructure that allows hotels have the necessary quality standards. Within this infrastructure the continuous electrical service must have each hotel to meet the needs of tourists stands. Today the keys are isolated from the SEN and electrical service is supplied by generators. These groups feed on fuel and diesel, and generate polluting gases near where the major hotel groups are. The problems in transporting fuel and pollution they generate have led to begin to analyze different ways of providing electric service stably in the keys. One possible option to address the problems generated by power generators in an isolated system is to interconnect the cay with SEN. This connection can be made in three ways; by airlines, underground cables or submarine cables. The airlines in the tourist areas are discarded because they affect the visuality this is why variants of underground cables or submarines are almost always handled. The proposal is to interconnect the keys with submarine cable where current conditions do not allow the use of underground cables. This interconnection can meet the demand of the keys stably and more reliably than current conditions. In addition to cases where there is a tourism growth should be no more generators only have a cable with the ability to transfer all the power needed. (author)

  8. Key skills by design: adapting a central Web resource to departmental contexts

    Directory of Open Access Journals (Sweden)

    Claire McAvinia

    2002-12-01

    Full Text Available Web-based delivery of support materials for students has proved to be a popular way of helping small teams to implement key skills policies within universities. The development of 'key' or 'transferable' skills is now encouraged throughout education, but resources (both in terms of staffing and budget tend to be limited. It is difficult for key skills teams to see learners face to face, and not feasible to print or distribute large amounts of paper-based material. Web-based delivery presents a means of overcoming these problems but it can result in generic study skills material simply being published online without due consideration of the needs of different groups of learners within different subject disciplines. Therefore, although a centralized Website for skills provision can overcome logistical problems, it may be perceived as irrelevant or unusable by the student population. This paper presents a model for Web-based delivery of support for key skills which incorporates two separate approaches to the design of these resources. The model was implemented as part of a wider key skills pilot project at University College London, over a period of one year. It includes a 'core' Website, containing information and resources for staff and students. These can also be accessed via customized, departmental key skills homepages. This paper presents the basis for the design choices made in preparing these materials, and the evaluation of some of the pilot departments using them. It then draws some wider conclusions about the effectiveness of this design for supporting skills development.

  9. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  10. Newborn Survival Case Study in Rwanda - Bottleneck Analysis and Projections in Key Maternal and Child Mortality Rates Using Lives Saved Tool (LiST).

    Science.gov (United States)

    Khurmi, Manpreet Singh; Sayinzoga, Felix; Berhe, Atakilt; Bucyana, Tatien; Mwali, Assumpta Kayinamura; Manzi, Emmanuel; Muthu, Maharajan

    2017-01-01

    The Newborn Survival Case study in Rwanda provides an analysis of the newborn health and survival situation in the country. It reviews evidence-based interventions and coverage levels already implemented in the country; identifies key issues and bottlenecks in service delivery and uptake of services by community/beneficiaries, and provides key recommendations aimed at faster reduction in newborn mortality rate. This study utilized mixed method research including qualitative and quantitative analyses of various maternal and newborn health programs implemented in the country. This included interviewing key stakeholders at each level, field visits and also interviewing beneficiaries for assessment of uptake of services. Monitoring systems such as Health Management Information Systems (HMIS), maternal and newborn death audits were reviewed and data analyzed to aid these analyses. Policies, protocols, various guidelines and tools for monitoring are already in place however, implementation of these remains a challenge e.g. infection control practices to reduce deaths due to sepsis. Although existing staff are quite knowledgeable and are highly motivated, however, shortage of health personnel especially doctors in an issue. New facilities are being operationalized e.g. at Gisenyi, however, the existing facilities needs expansion. It is essential to implement high impact evidence based interventions but coverage levels need to be significantly high in order to achieve higher reduction in newborn mortality rate. Equity approach should be considered in planning so that the services are better implemented and the poor and needy can get the benefits of public health programs.

  11. Simulation of Two-Way Pushdown Automata Revisited

    Directory of Open Access Journals (Sweden)

    Robert Glück

    2013-09-01

    Full Text Available The linear-time simulation of 2-way deterministic pushdown automata (2DPDA by the Cook and Jones constructions is revisited. Following the semantics-based approach by Jones, an interpreter is given which, when extended with random-access memory, performs a linear-time simulation of 2DPDA. The recursive interpreter works without the dump list of the original constructions, which makes Cook's insight into linear-time simulation of exponential-time automata more intuitive and the complexity argument clearer. The simulation is then extended to 2-way nondeterministic pushdown automata (2NPDA to provide for a cubic-time recognition of context-free languages. The time required to run the final construction depends on the degree of nondeterminism. The key mechanism that enables the polynomial-time simulations is the sharing of computations by memoization.

  12. Do Exchange Rates Really Help Forecasting Commodity Prices?

    DEFF Research Database (Denmark)

    Bork, Lasse; Kaltwasser, Pablo Rovira; Sercu, Piet

    Chen et al. (2010) report that for ‘commodity currencies’, the exchange rate predicts the country’s commodity index but not vice versa. The commodity currency hypothesis is consistent with the Engle and West (2005) exchange rate model if the fundamental is chosen to be the country’s key export...... expectations, one should mostly observe contemporaneous correlations, not one-directional cross-predictability from one variable toward the other. Using three different data sets and various econometric techniques, we do find the contemporaneous correlations as predicted by the financial asset view......-averaged prices in the commodity index data that they use (price averaging induces spurious autocorrelation and predictability) and to features in their test procedures....

  13. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  14. Distribution of the Determinant of the Sample Correlation Matrix: Monte Carlo Type One Error Rates.

    Science.gov (United States)

    Reddon, John R.; And Others

    1985-01-01

    Computer sampling from a multivariate normal spherical population was used to evaluate the type one error rates for a test of sphericity based on the distribution of the determinant of the sample correlation matrix. (Author/LMO)

  15. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  16. One stop shop versus collaborative integration: what is the best way of delivering sexual health services?

    Science.gov (United States)

    French, R S; Coope, C M; Graham, A; Gerressu, M; Salisbury, C; Stephenson, J M

    2006-06-01

    To examine various models of integrated and/or one stop shop (OSS) sexual health services (including general practice, mainstream specialist services, and designated young people's services) and explore their relative strengths and weaknesses. Literature review and interviews with key informants involved in developing the National Strategy for Sexual Health and HIV (n = 11). The paper focuses on five broad perspectives (logistics, public health, users, staff, and cost). Contraceptive and genitourinary medicine issues are closely related. However, there is no agreement about what is meant by having "integrated" services, about which services should be integrated, or where integration should happen. There are concerns that OSSs will result in over-centralisation, to the disadvantage of stand alone and satellite services. OSS models are potentially more user focused, but the stigma that surrounds sexual health services may create an access barrier. From staff perspectives, the advantages are greater career opportunities and increased responsibility, while the disadvantages are concern that OSSs will result in loss of expertise and professional status. Cost effectiveness data are contradictory. Although there is a policy commitment to look at how integrated services can be better developed, more evidence is required on the impact and appropriateness of this approach.

  17. ROLE, INTERESTS AND CRITICS OF CREDIT RATING AGENCIES

    Directory of Open Access Journals (Sweden)

    Suzana Baresa

    2012-06-01

    Full Text Available Key role of credit rating agencies is reducing the asymmetry information about credit quality (of governments, business entities or securities between issuers and investors, and ensuring a common standard of measuring the creditworthiness. Credit rating agencies are engaged in the sale of opinions about creditworthiness in the form of an alphabetical letter or symbol, which represents a unique ranking. Their opinion is not a guarantee, but it largely dictates the costs and the profits in the financial markets. This work shows the influence of credit rating agencies to investors and publishers, and their role as market regulators. Conflict of interest is a fundamental problem, which is caused by their way of doing business, it arises from their two main objectives: profit and market regulation, which will be explored in the work. Looking back in history credit rating agencies often selected goal of making a profit at the cost of market regulation, therefore they have caused the collapse of the market, and founded themselves criticized by the public.

  18. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  19. Exchange Rate Expectations, Currency Crises, and the Pricing of American Depositary Receipts

    OpenAIRE

    Eichler, Stefan

    2012-01-01

    I.1 Motivation Exchange rates are a key issue in international economics and politics. While the determinants of exchange rates have been extensively studied in previous works, this dissertation contributes to the literature by deriving exchange rate expectations from stock market (ADR) data and analyzing their determinants. This exercise is done for three cases where one has to resort to exchange rate expectations since the national exchange rate is either manipulated by the central bank...

  20. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  1. Cross Functional Career Navigation: The Way to Broaden Your Career Options

    Science.gov (United States)

    Greenhalgh, Todd

    2000-03-01

    In today's rapid paced global environment, broadening career options for career development depends on successful cross-functional career navigation. For scientists and engineers, this means developing a diversity of skills in addition to a strong technical foundation. Fortunately, companies use cross-functional teams as one of the key tools for rapidly developing and commercializing products and services. Participation on these teams carries with it the additional benefit of allowing an individual to develop new skills, and to gain valuable expertise in areas that are critical to the growth of their company, their industry and, most importantly, their career. This talk will outline some of the important cross functional skills that can propel your career ahead and ways in which you can take charge of your career mapping and enhance your value and employability.

  2. Ways of Viewing Pictorial Plasticity

    Directory of Open Access Journals (Sweden)

    Maarten W. A. Wijntjes

    2017-03-01

    Full Text Available The plastic effect is historically used to denote various forms of stereopsis. The vivid impression of depth often associated with binocular stereopsis can also be achieved in other ways, for example, using a synopter. Accounts of this go back over a hundred years. These ways of viewing all aim to diminish sensorial evidence that the picture is physically flat. Although various viewing modes have been proposed in the literature, their effects have never been compared. In the current study, we compared three viewing modes: monocular blur, synoptic viewing, and free viewing (using a placebo synopter. By designing a physical embodiment that was indistinguishable for the three experimental conditions, we kept observers naïve with respect to the differences between them; 197 observers participated in an experiment where the three viewing modes were compared by performing a rating task. Results indicate that synoptic viewing causes the largest plastic effect. Monocular blur scores lower than synoptic viewing but is still rated significantly higher than the baseline conditions. The results strengthen the idea that synoptic viewing is not due to a placebo effect. Furthermore, monocular blur has been verified for the first time as a way of experiencing the plastic effect, although the effect is smaller than synoptic viewing. We discuss the results with respect to the theoretical basis for the plastic effect. We show that current theories are not described with sufficient details to explain the differences we found.

  3. Ways of Viewing Pictorial Plasticity.

    Science.gov (United States)

    Wijntjes, Maarten W A

    2017-01-01

    The plastic effect is historically used to denote various forms of stereopsis. The vivid impression of depth often associated with binocular stereopsis can also be achieved in other ways, for example, using a synopter. Accounts of this go back over a hundred years. These ways of viewing all aim to diminish sensorial evidence that the picture is physically flat. Although various viewing modes have been proposed in the literature, their effects have never been compared. In the current study, we compared three viewing modes: monocular blur, synoptic viewing, and free viewing (using a placebo synopter). By designing a physical embodiment that was indistinguishable for the three experimental conditions, we kept observers naïve with respect to the differences between them; 197 observers participated in an experiment where the three viewing modes were compared by performing a rating task. Results indicate that synoptic viewing causes the largest plastic effect. Monocular blur scores lower than synoptic viewing but is still rated significantly higher than the baseline conditions. The results strengthen the idea that synoptic viewing is not due to a placebo effect. Furthermore, monocular blur has been verified for the first time as a way of experiencing the plastic effect, although the effect is smaller than synoptic viewing. We discuss the results with respect to the theoretical basis for the plastic effect. We show that current theories are not described with sufficient details to explain the differences we found.

  4. Optimal Mutation Rates for the (1+lambda) EA on OneMax Through Asymptotically Tight Drift Analysis

    DEFF Research Database (Denmark)

    Gießen, Christian; Witt, Carsten

    2018-01-01

    We study the (1+) EA, a classical population-based evolutionary algorithm, with mutation probability c / n, where and are constant, on the benchmark function OneMax, which counts the number of 1-bits in a bitstring. We improve a well-established result that allows to determine the first hitting t...... that mutation rates up to 10% larger than the asymptotically optimal rate 1 / n minimize the expected runtime. However, in absolute terms the expected runtime does not change by much when replacing 1 / n with the optimal mutation rate....... drift is known. This reduces the analysis of expected optimization time to finding an exact expression for the drift. We then give an exact closed-form expression for the drift and develop a method to approximate it very efficiently, enabling us to determine approximate optimal mutation rates for the (1......+) EA for various parameter settings of c and and also for moderate sizes of n. This makes the need for potentially lengthy and costly experiments in order to optimize c for fixed n and for the optimization of OneMax unnecessary. Interestingly, even for moderate n and not too small it turns out...

  5. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  6. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  7. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  8. Web of life and ways of life

    Directory of Open Access Journals (Sweden)

    Caterina Croce

    2013-03-01

    Full Text Available The notion of bios is a key-concept in Foucault's research. In the studies about the ancient world, bios stands out as an ethic substance relevant to the practice, the control and the transformation of the self. It is worth investigating the analogies and the differences between the notion of bios as it is meant in the last lectures at the Collège de France and that of bios as a creative force, shared and plural, that we find in previous seasons of Foucault research. The issue of 'way of life' allows us to explore the ambivalences of this topic. In its singular/plural declination, bios raises questions about the common living, which results from the coexistence and sharing of different ways of life – bioi – that cut through the ground of the institutionalized relationships.

  9. Literacy Rates and its Impact on Birth Rates in Nadia District, West Bengal, India

    Directory of Open Access Journals (Sweden)

    Mahadeb Ghosh

    2016-11-01

    Full Text Available Equality in socio-economic component is essential for human development and social change. Educational inequality reduces economic growth and women's empowerment on the one hand and increases birth rate on the other. In population studies, it has been established that educational level is collinearly related with demographic behaviour. This study aims to investigate inequalities in literacy rates and its impact on birth rates in Nowpara-I Gram Panchayat (GP located in the Krishnagar II C.D. Block, Nadia District of West Bengal using a household survey conducted in 356 households among women aged 49 and above in triangulation with secondary data. The aim of this study is to explore the causes of the spatial inequalities in education and its effect on spatial variations in birth rates. The key finding suggest that in Nowpara-I, negative relationships exist between female education and birth rate because education has a positive impact on empowerment, late marriage, use of contraceptives and family size.

  10. One Way or Return? The Journey from Practitioner to Researcher

    Science.gov (United States)

    Buoro, Ivano

    2015-01-01

    The journey from VET practitioner to academic researcher is not an easy one, especially for VET teachers whose educational research training in action and ethnographic research have been inculcated through years of practice. This paper discusses the highlights of the journey from practitioner to practitioner researcher including a discussion of…

  11. Mind, brain and body. Healing trauma: the way forward.

    Science.gov (United States)

    Wilkinson, Margaret

    2017-09-01

    The paper explores an interdisciplinary whole person approach to healing from trauma that conserves our rich inheritance from Jung but also takes on board insights from research in the areas of attachment, trauma and the neurobiology of emotion. It is now over 20 years since insights from neurobiology began to be used to inform clinical practice. The paper reviews key insights which have emerged, along with the ways they enable therapists to help mind, brain and body to heal and the ways in which they clarify why, in clinical practice, we do what we do. Traditionally the emphasis has been on words, interpretations, and meaning-making. Currently there is greater appreciation of the affective, relational, embodied aspects of therapeutic work and the way in which these relate to traumatic early interactive experience that is held outside of human awareness. The ways in which knowledge of particular systems of connectivity inform understanding of the whole mind-brain-body relationship are examined. The way forward for clinical practice to become more focused in order to help clients to heal in mind and body is reviewed. © 2017, The Society of Analytical Psychology.

  12. Ecological Understanding 2: Transformation--A Key to Ecological Understanding.

    Science.gov (United States)

    Carlsson, Britta

    2002-01-01

    Describes the structure and general features of the phenomenon of ecological understanding. Presents qualitatively different ways of experiencing cycling of matter and the flow of energy in the context of ecosystems. The idea of transformation is key to the development of ecological understanding. (Contains 17 references.) (Author/YDS)

  13. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  14. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  15. Chaotic map based key agreement with/out clock synchronization

    International Nuclear Information System (INIS)

    Han, S.; Chang, E.

    2009-01-01

    In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.

  16. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  17. Effects of Monetary Shocks on Exchange Rate: Empirical Evidence from India

    Directory of Open Access Journals (Sweden)

    Sharma Chandan

    2017-08-01

    Full Text Available This paper examines the effect of monetary policy shocks on exchange rate in a Multiple Indicator Approach (MIA framework. This study has employed a monetary policy index of key monetary policy instruments in India (Bank rate, Cash Reserve Ratio, Repo and Reverse Repo rates. The study finds the empirical evidence for puzzling behavior of price level and exchange rate. Both price and exchange rate increase initially in response to a contractionary policy shock. Policy shocks affect output, inflation and exchange rate to an appreciable extent over a forecasting horizon of one year.

  18. X-ray film reject rate analysis at eight selected government hospitals ...

    African Journals Online (AJOL)

    admin

    the quality and efficiency of radiology services is imperative. ... principle). One way of achieving this is through a quality assurance program, which includes procedures that help ..... audit of film rejects and repeats rates in a department.

  19. Analyses of different configurations for a multiple rod Nd:YAG system with a one-way travelling probe beam

    International Nuclear Information System (INIS)

    Wang, You; Kan, Hirofumi; Ogawa, Takayo; Wada, Satoshi

    2011-01-01

    In this paper, the birefringence in an LD-side-pumped solid-state laser (LSPSSL) system is studied by using a quasi plane-wave probe beam. The effects on birefringence compensation have been investigated for different coupling systems arranged between two tandem-set rods. Both the aperture obstruction and the thermally induced lens effect have been taken into consideration in the theoretical explanation. It is shown that most birefringence can be successfully removed by using a suitable lens system as well as a quartz 90° rotator. In construction of a real resonator, such performances as the birefringence compensation, the extraction efficiency, and the high-order-mode control must be carefully balanced at the same time. Although the conclusions are based on analyses of a one-way travelling wave, the methodology introduced in this paper is thought to be useful for a stationary-wave design of the laser oscillator

  20. ASTROBIOLOGICAL EFFECTS OF GAMMA-RAY BURSTS IN THE MILKY WAY GALAXY

    Energy Technology Data Exchange (ETDEWEB)

    Gowanlock, Michael G., E-mail: gowanloc@mit.edu [Massachusetts Institute of Technology, Haystack Observatory, 99 Millstone Road, Westford, MA 01886 (United States)

    2016-11-20

    A planet having protective ozone within the collimated beam of a gamma-ray burst (GRB) may suffer ozone depletion, potentially causing a mass extinction event to existing life on a planet’s surface and oceans. We model the dangers of long GRBs to planets in the Milky Way and utilize a static statistical model of the Galaxy, which matches major observable properties, such as the inside-out star formation history (SFH), metallicity evolution, and three-dimensional stellar number density distribution. The GRB formation rate is a function of both the SFH and metallicity. However, the extent to which chemical evolution reduces the GRB rate over time in the Milky Way is still an open question. Therefore, we compare the damaging effects of GRBs to biospheres in the Milky Way using two models. One model generates GRBs as a function of the inside-out SFH. The other model follows the SFH, but generates GRB progenitors as a function of metallicity, thereby favoring metal-poor host regions of the Galaxy over time. If the GRB rate only follows the SFH, the majority of the GRBs occur in the inner Galaxy. However, if GRB progenitors are constrained to low-metallicity environments, then GRBs only form in the metal-poor outskirts at recent epochs. Interestingly, over the past 1 Gyr, the surface density of stars (and their corresponding planets), which survive a GRB is still greatest in the inner galaxy in both models. The present-day danger of long GRBs to life at the solar radius ( R {sub ⊙} = 8 kpc) is low. We find that at least ∼65% of stars survive a GRB over the past 1 Gyr. Furthermore, when the GRB rate was expected to have been enhanced at higher redshifts, such as z ≳ 0.5, our results suggest that a large fraction of planets would have survived these lethal GRB events.

  1. Do Teacher Absences Impact Student Achievement? Longitudinal Evidence from One Urban School District. NBER Working Paper No. 13356

    Science.gov (United States)

    Miller, Raegen T.; Murnane, Richard J.; Willett, John B.

    2007-01-01

    Rates of employee absences and the effects of absences on productivity are topics of conversation in many organizations in many countries. One reason is that high rates of employee absence may signal weak management and poor labor-management relations. A second reason is that reducing rates of employee absence may be an effective way to improve…

  2. Can Two Psychotherapy Process Measures Be Dependably Rated Simultaneously? A Generalizability Study

    Science.gov (United States)

    Ulvenes, Pal G.; Berggraf, Lene; Hoffart, Asle; Levy, Raymon A.; Ablon, J. Stuart; McCullough, Leigh; Wampold, Bruce E.

    2012-01-01

    Observer ratings in psychotherapy are a common way of collecting information in psychotherapy research. However, human observers are imperfect instruments, and their ratings may be subject to variability from several sources. One source of variability can be raters' assessing more than 1 instrument at a time. The purpose of this research is to…

  3. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  4. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation.

    Science.gov (United States)

    Waheed, Maham; Ahmad, Rizwan; Ahmed, Waqas; Drieberg, Micheal; Alam, Muhammad Mahtab

    2018-02-13

    The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs). Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor's battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE) and packet error rate (PER) are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link.

  5. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation

    Directory of Open Access Journals (Sweden)

    Maham Waheed

    2018-02-01

    Full Text Available The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs. Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor’s battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE and packet error rate (PER are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC coding the cooperative link.

  6. Experimental multiplexing of quantum key distribution with classical optical communication

    International Nuclear Information System (INIS)

    Wang, Liu-Jun; Chen, Luo-Kan; Ju, Lei; Xu, Mu-Lan; Zhao, Yong; Chen, Kai; Chen, Zeng-Bing; Chen, Teng-Yun; Pan, Jian-Wei

    2015-01-01

    We demonstrate the realization of quantum key distribution (QKD) when combined with classical optical communication, and synchronous signals within a single optical fiber. In the experiment, the classical communication sources use Fabry-Pérot (FP) lasers, which are implemented extensively in optical access networks. To perform QKD, multistage band-stop filtering techniques are developed, and a wavelength-division multiplexing scheme is designed for the multi-longitudinal-mode FP lasers. We have managed to maintain sufficient isolation among the quantum channel, the synchronous channel and the classical channels to guarantee good QKD performance. Finally, the quantum bit error rate remains below a level of 2% across the entire practical application range. The proposed multiplexing scheme can ensure low classical light loss, and enables QKD over fiber lengths of up to 45 km simultaneously when the fibers are populated with bidirectional FP laser communications. Our demonstration paves the way for application of QKD to current optical access networks, where FP lasers are widely used by the end users

  7. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  8. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  9. Midwifery capacity building in Papua New Guinea: Key achievements and ways forward.

    Science.gov (United States)

    Dawson, Angela; Kililo, Mary; Geita, Lahui; Mola, Glen; Brodie, Pat M; Rumsey, Michele; Copeland, Felicity; Neill, Amanda; Homer, Caroline S E

    2016-04-01

    Papua New Guinea has some of the poorest health outcomes in the Asia-Pacific region. Maternal mortality is unacceptably high and there is a severe midwifery shortage requiring a quadrupling of the workforce. This paper outlines the findings of an evaluation of the Maternal Child Health Initiative (MCHI) (2012-2013) to determine key factors contributing to maternal health workforce strengthening. A descriptive mixed methods study was undertaken. Data were gathered through interviews, focus group discussions and surveys with clinicians, midwifery students and staff from nursing and midwifery schools and National Department of Health staff. Documentation from stakeholder meetings and regular site reports were reviewed. Each data set was analysed separately and meta-inferences were drawn across all data. Learning opportunities were found to have increased for midwifery educators and improvements were described in midwifery educators teaching capacity and student clinical education experience. There was an increase in the number of midwifery graduates and improvements were noted in the working environment and skills of clinical staff. Education challenges were described including the lack of clinical preceptoring and limited continuing education for clinical educators. Participants recommended increasing clinical education hours and extending the length of the midwifery program. Ongoing efforts to accredit the midwifery curricula and regulate midwifery graduates were noted. The MCHI has contributed to strengthening the midwifery workforce nationally. However, scaling-up and sustaining these achievements requires leadership and funding commitments from the midwifery schools and government alongside the accreditation of midwifery curricula and regulation of new graduates. Copyright © 2015 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  10. Negative Nominal Interest Rates: Three ways to overcome the zero lower bound

    OpenAIRE

    Willem H. Buiter

    2009-01-01

    The paper considers three methods for eliminating the zero lower bound on nominal interest rates and thus for restoring symmetry to domain over which the central bank can vary its policy rate. They are: (1) abolishing currency (which would also be a useful crime-fighting measure); (2) paying negative interest on currency by taxing currency; and (3) decoupling the numéraire from the currency/medium of exchange/means of payment and introducing an exchange rate between the numéraire and the curr...

  11. wayGoo: a platform for geolocating and managing indoor and outdoor spaces

    Science.gov (United States)

    Thomopoulos, Stelios C. A.; Karafylli, Christina; Karafylli, Maria; Motos, Dionysis; Lampropoulos, Vassilis; Dimitros, Kostantinos; Margonis, Christos

    2016-05-01

    wayGoo2 is a platform for Geolocating and Managing indoor and outdoor spaces and content with multidimensional indoor and outdoor Navigation and Guidance. Its main components are a Geographic Information System, a back-end server, front-end applications and a web-based Content Management System (CMS). It constitutes a fully integrated 2D/3D space and content management system that creates a repository that consists of a database, content components and administrative data. wayGoo can connect to any third party database and event management data-source. The platform is secure as the data is only available through a Restful web service using https security protocol in conjunction with an API key used for authentication. To enhance users experience, wayGoo makes the content available by extracting components out of the repository and constructing targeted applications. The wayGoo platform supports geo-referencing of indoor and outdoor information and use of metadata. It also allows the use of existing information such as maps and databases. The platform enables planning through integration of content that is connected either spatially, temporally or contextually, and provides immediate access to all spatial data through interfaces and interactive 2D and 3D representations. wayGoo constitutes a mean to document and preserve assets through computerized techniques and provides a system that enhances the protection of your space, people and guests when combined with wayGoo notification and alert system. It constitutes a strong marketing tool providing staff and visitors with an immersive tool for navigation in indoor spaces and allowing users to organize their agenda and to discover events through wayGoo event scheduler and recommendation system. Furthermore, the wayGoo platform can be used in Security applications and event management, e.g. CBRNE incidents, man-made and natural disasters, etc., to document and geolocate information and sensor data (off line and real time

  12. High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits

    Science.gov (United States)

    2014-01-28

    polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating

  13. The determinants of exchange rate in Croatia

    Directory of Open Access Journals (Sweden)

    Manuel BENAZIC

    2016-06-01

    Full Text Available The dilemma for every country with an independent monetary policy is which kind of exchange rate arrangement should be applied. Through the exchange rate policy, countries can influence their economies, i.e. price stability and export competiveness. Croatia is a new EU member state, it has its own monetary policy and currency but it is on the way to euro introduction. Regarding the experiences from the beginning of the 1990s when Croatia was faced with serious monetary instabilities and hyperinflation, the goal of Croatian National Bank (CNB is to ensure price stability and one way to do so is through exchange rate policy. Croatia, as a small and open economy, has applied a managed floating exchange rate regime. The exchange rate is determined primarily by the foreign exchange supply and demand on the foreign exchange market, with occasional market interventions by the CNB. Therefore, in order to maintain exchange rate stability, policymakers must be able to recognize how changes in these factors affect changes in the exchange rate. This research aims to find a relationship among the main sources of foreign currency inflow and outflow and the level of exchange rate in Croatia. The analysis is carried out by using the bounds testing (ARDL approach for co-integration. The results indicate the existence of a stable co-integration relationship between the observed variables, whereby an increase in the majority of variables leads to an exchange rate appreciation.

  14. Professor Janet Wasko: An Interview with the President of the IAMCR and one of the Key Representatives of the Political Economy of Communication Approach

    Directory of Open Access Journals (Sweden)

    Jernej Amon Prodnik

    2014-01-01

    Full Text Available This paper presents an interview with Janet Wasko. She is a Professor and Knight Chair in Communication Research at the University of Oregon’s School of Journalism and Communication and widely considered as one of the key authors working in the tradition of the political economy of communication. Currently she is serving as the President of the International Association for Media and Communication Research (IAMCR, one of the key international associations in the field of media and communication studies. She previously held several other positions in the IAMCR and served as the head of the Political Economy-section, which she also helped to establish. Professor Wasko published several influential books on the film industry, especially on Hollywood and the Disney Corporation. We talked especially about the influences on her approach, about her position in the IAMCR, her understanding of how the cultural and media industries work, the political economy approach in media and communication studies, and issues related to the film industry, which she mostly tackles in her own research.

  15. On multi-rate Erlang-B computations

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk; Nilsson, A.A.; Perry, M.

    1999-01-01

    The single-rate Erlang-B model is and has been a cornerstone of numerous traffic engineering applications which involve the calculation and optimization of blocking probabilities. However, with the emerging integrated multimedia networks, one single traffic type is often inadequate. Yet the single......-rate Erlang-B model is often used even for today's new networks. A primary reason for this is the existence of methods to compute blocking probabilities and their derivatives that are simple, fast, and stable. With this paper, we provide an improved, and better, way of computing multi-rate Erlang-B blocking...... probabilities and their derivatives. Since the improvements are also simple, fast, direct, and stable, optimization and engineering methods based on a single-rate Erlang-B model can now be easily extended to emerging multimedia networks....

  16. Improving the Way State and Federal Co-Regulators Communicate about Risk

    International Nuclear Information System (INIS)

    Easton, E.; Janairo, L.R.

    2009-01-01

    This paper explores risk communications concepts that could be used by Federal and state governments to help the public understand how government officials rely on risk analysis and management to ensure that shipments of spent fuel and other radioactive wastes take place in a safe, secure manner that merits public confidence. A key focus in the communication concepts put forward in the paper is the relationship between understanding and validating the public's concerns and explaining how those concerns are being addressed by current safety requirements and practices. The authors will recommend best practices to state and Federal officials that have the responsibility for communicating with the public about radioactive waste transportation. The paper will also suggest ways to bring these state and federal co-regulators together to communicate more effectively and to speak with one voice on the issue of shipment safety. (authors)

  17. Behind the scenes of GS: there’s only one way to go

    CERN Multimedia

    Anaïs Schaeffer

    2014-01-01

    At CERN, all of the Laboratory’s imports and exports are routed in the same way: through the Logistics Service. This GS-IS Group service is responsible for receiving, inspecting and distributing all goods sent to the Organization.   Whether products for the CERN Stores, components for the experiments, tools, machinery and materials for the workshops or equipment for users and members of the personnel, nothing escapes the attention of CERN’s Logistics Service, which every year processes nearly 70,000 incoming deliveries, 7,500 shipments and 160,000 distributed items. “The vast majority of our imports come from CERN Member States,” says imports and customs procedures manager Laurence Planque, “but we are receiving more and more goods for collaborators working at CERN from non-Member States such as China, India and Pakistan. All these imports are entitled to diplomatic exemption, so every day we have to manage the customs clearance procedures wit...

  18. Self-Esteem: The Key to a Child's Success and Happiness.

    Science.gov (United States)

    Cutright, Melitta C.

    1992-01-01

    The article discusses self-esteem as the key to parenting a successful, happy child. It notes ways parents can help foster self-esteem starting at a very early age. Ten suggestions for building a child's self-esteem, developed by the National PTA, are listed. (SM)

  19. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  20. Patient safety in a service of medical physics. Key indicators

    International Nuclear Information System (INIS)

    Font Gomez, J. A.; Gandia Martinez, A.; Jimenez Albericio, F. J.; Andres Redondo, M. M.; Mengual Gil, M. A.

    2013-01-01

    The key indicators are those that endure over time to monitor the degree of compliance with the criteria in the processes that are considered key in the service. In the case of our service, define key indicators within the framework of ISO 9001 certification in the process of clinical dosimetry. All problems do not have same casuistry or not, have the same detrimental to the safety of the patient. We have prioritized some of the problems and opportunities for improvement have been found. Standard refers to the value of the indicator that we should or would like to achieve in such a way that if not achieved, action of improvement will be required. (Author)

  1. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  2. Status of rates and rate equations for thermal leptogenesis

    Science.gov (United States)

    Biondini, S.; Bödeker, D.; Brambilla, N.; Garny, M.; Ghiglieri, J.; Hohenegger, A.; Laine, M.; Mendizabal, S.; Millington, P.; Salvio, A.; Vairo, A.

    2018-02-01

    In many realizations of leptogenesis, heavy right-handed neutrinos play the main role in the generation of an imbalance between matter and antimatter in the early Universe. Hence, it is relevant to address quantitatively their dynamics in a hot and dense environment by taking into account the various thermal aspects of the problem at hand. The strong washout regime offers an interesting framework to carry out calculations systematically and reduce theoretical uncertainties. Indeed, any matter-antimatter asymmetry generated when the temperature of the hot plasma T exceeds the right-handed neutrino mass scale M is efficiently erased, and one can focus on the temperature window T ≪ M. We review recent progress in the thermal field theoretic derivation of the key ingredients for the leptogenesis mechanism: the right-handed neutrino production rate, the CP asymmetry in the heavy-neutrino decays and the washout rates. The derivation of evolution equations for the heavy-neutrino and lepton-asymmetry number densities, their rigorous formulation and applicability are also discussed.

  3. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  4. Estimation of the players maximum heart rate in real game situations in team sports: a practical propose

    Directory of Open Access Journals (Sweden)

    Jorge Cuadrado Reyes

    2011-05-01

    Full Text Available Abstract   This  research developed a logarithms  for calculating the maximum heart rate (max. HR for players in team sports in  game situations. The sample was made of  thirteen players (aged 24 ± 3   to a  Division Two Handball team. HR was initially measured by Course Navette test.  Later, twenty one training sessions were conducted  in which HR and Rate of Perceived Exertion (RPE, were  continuously monitored, in each task. A lineal regression analysis was done  to help find a max. HR prediction equation from the max. HR of the three highest intensity sessions. Results from  this equation correlate significantly with data obtained in the Course Navette test and with those obtained by other indirect methods. The conclusion of this research is that this equation provides a very useful and easy way to measure the max. HR in real game situations, avoiding non-specific analytical tests and, therefore laboratory testing..   Key words: workout control, functional evaluation, prediction equation.

  5. A comparative study on the effectiveness of one-way printed communication versus videophone interactive interviews on health promotion.

    Science.gov (United States)

    Homma, Satoki; Imamura, Haruhiko; Nakamura, Toru; Fujimura, Kaori; Ito, Yoshihiro; Maeda, Yuji; Kaneko, Ikuyo

    2016-01-01

    We performed a comparative study of a health education programme that was delivered either through one-way communication with printed media, or through interactive videophone interviews. We aimed to ascertain which mode of counselling, when used in combination with telemonitoring, is more effective at lifestyle modification intended to improve health status. Participants, who were residents of Kurihara city in Miyagi prefecture, Japan, were randomized into two groups: one group received individualized monthly documented reports (n = 33; 22 females; average age: 67.2 years), and the other received interactive videophone communication (n = 35; 22 females; average age: 65.1 years) for three months. Telemonitoring was conducted on both groups, using a pedometer, weighing scale and a sphygmomanometer. Pre- and post-intervention, anthropometric measurements and blood tests were performed; the participants also completed self-administered questionnaires. The two groups showed similar degrees of health status improvement and satisfaction levels. However, the participants in the videophone group were more aware of improvements in their lifestyles than were the participants in the document group. The individualized printed communication programme was less time-consuming compared to videophone communication. Further studies are needed to formulate a balanced protocol for a counselling-cum-telemonitoring programme that provides optimal health improvement and cost performance with the available human resources. © The Author(s) 2015.

  6. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  7. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  8. Calculating second derivatives of population growth rates for ecology and evolution

    NARCIS (Netherlands)

    Shyu, E.; Caswell, H.

    2014-01-01

    Second derivatives of the population growth rate measure the curvature of its response to demographic, physiological or environmental parameters. The second derivatives quantify the response of sensitivity results to perturbations, provide a classification of types of selection and provide one way

  9. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis, a key seed disperser for Patagonian forest regeneration.

    Directory of Open Access Journals (Sweden)

    Susana Patricia Bravo

    Full Text Available Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May, elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug., birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500-600 km/day, crossing desert and grasslands, while others took a detour, flying 100-200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals

  10. The (1+λ) evolutionary algorithm with self-adjusting mutation rate

    DEFF Research Database (Denmark)

    Doerr, Benjamin; Witt, Carsten; Gießen, Christian

    2017-01-01

    We propose a new way to self-adjust the mutation rate in population-based evolutionary algorithms. Roughly speaking, it consists of creating half the offspring with a mutation rate that is twice the current mutation rate and the other half with half the current rate. The mutation rate is then upd......We propose a new way to self-adjust the mutation rate in population-based evolutionary algorithms. Roughly speaking, it consists of creating half the offspring with a mutation rate that is twice the current mutation rate and the other half with half the current rate. The mutation rate...... is then updated to the rate used in that subpopulation which contains the best offspring. We analyze how the (1 + A) evolutionary algorithm with this self-adjusting mutation rate optimizes the OneMax test function. We prove that this dynamic version of the (1 + A) EA finds the optimum in an expected optimization...... time (number of fitness evaluations) of O(nA/log A + n log n). This time is asymptotically smaller than the optimization time of the classic (1 + A) EA. Previous work shows that this performance is best-possible among all A-parallel mutation-based unbiased black-box algorithms. This result shows...

  11. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  12. The antecedents and consequences of restrictive age-based ratings in the global motion picture industry

    NARCIS (Netherlands)

    Leenders, M.A.A.M.; Eliashberg, J.

    2011-01-01

    This article analyzes one key characteristic shared by a growing number of industries. Specifically, their products and services are continuously monitored and evaluated by local third-party ratings systems. In this study, we focus on understanding the local drivers of restrictive age-based ratings

  13. Repeal of the Sustainable Growth Rate: an overview for surgeons.

    Science.gov (United States)

    Sangji, Naveen F

    2014-10-01

    The Medicare sustainable growth rate (SGR) formula is used to control Medicare spending on physician services. Under the current SGR formula, physicians face an almost 24% cut to the Medicare fee schedule on April 1, 2015. The US House Way & Means and Energy & Commerce Committees and the Senate Finance Committee released jointly proposed legislation to permanently repeal the SGR, and transition Medicare physician payment to a value-based payment method. This review summarizes the key components of the proposed legislation, and discusses some of the political challenges ahead. House Committees on Energy & Commerce and Ways & Means, and the Senate Committee on Finance staff write-ups. Physician Medicare reimbursement will move from a volume-based model to a value-based model over the next decade. Surgeons should remain engaged with the political process to ensure repeal of the SGR. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. One Hundred and One Ways to Infinity: Part 2.

    Science.gov (United States)

    Gardiner, A.

    1980-01-01

    Part 2 considers the limit of a sequence and extends this to include ideas such as continuity, derivative, and integral. The discussion concludes with an example of a finite or "counted completely" set, the Fermat primes. (MK)

  15. Ways of Thinking, Ways of Seeing Mathematical and other Modelling in Engineering and Technology

    CERN Document Server

    Dillon, Chris

    2012-01-01

    This fascinating book examines some of the characteristics of technological/engineering models that are likely to be unfamiliar to those who are interested primarily in the history and philosophy of science and mathematics, and which differentiate technological models from scientific and mathematical ones. Themes that will be highlighted include: • the role of language: the models developed for engineering design have resulted in new ways of talking about technological systems • communities of practice: related to the previous point, particular engineering communities have particular ways of sharing and developing knowledge • graphical (re)presentation: engineers have developed many ways of reducing quite complex mathematical models to more simple representations • reification: highly abstract mathematical models are turned into ‘objects’ that can be manipulated almost like components of a physical system • machines: not only the currently ubiquitous digital computer, but also older analogue dev...

  16. Order of current variance and diffusivity in the rate one totally asymmetric zero range process

    NARCIS (Netherlands)

    Balázs, M.; Komjáthy, J.

    2008-01-01

    We prove that the variance of the current across a characteristic is of order t 2/3 in a stationary constant rate totally asymmetric zero range process, and that the diffusivity has order t 1/3. This is a step towards proving universality of this scaling behavior in the class of one-dimensional

  17. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  18. Immunization Dropout Rates in Ihe, Awgu Local Government Area ...

    African Journals Online (AJOL)

    Background: Immunization against childhood diseases is one of the most important ways of preventing childhood morbidity and mortality. Aims: The objective of this study is to review the dropout rates of immunization of children in a health center using a single dose of diphtheria‑pertussis‑tetanus (DPT1) and three doses of ...

  19. All-optical two-way relaying free-space optical communications for HAP-based broadband backhaul networks

    Science.gov (United States)

    Vu, Minh Q.; Nguyen, Nga T. T.; Pham, Hien T. T.; Dang, Ngoc T.

    2018-03-01

    High-altitude platforms (HAPs) are flexible, non-pollutant and cost-effective infrastructures compared to satellite or old terrestrial systems. They are being researched and developed widely in Europe, USA, Japan, Korea, and so on. However, the current limited data rates and the overload of radio frequency (RF) spectrum are problems which the developers for HAPs are confronting because most of them use RF links to communicate with the ground stations (GSs) or each other. In this paper, we propose an all-optical two-way half-duplex relaying free-space optical (FSO) communication for HAP-based backhaul networks, which connect the base transceiver station (BTS) to the core network (CN) via a single HAP. Our proposed backhaul solution can be deployed quickly and flexibly for disaster relief and for serving users in both urban environments and remote areas. The key subsystem of HAP is an optical regenerate-and-forward (ORF) equipped with an optical hard-limiter (OHL) and an optical XOR gate to perform all-optical processing and help mitigate the background noise. In addition, two-way half-duplex relaying can be provided thanks to the use of network coding scheme. The closed-form expression for the bit error rate (BER) of our proposed system under the effect of path loss, atmospheric turbulence, and noise induced by the background light is formulated. The numerical results are demonstrated to prove the feasibility of our proposed system with the verification by using Monte-Carlo (M-C) simulations.

  20. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  1. International key comparison of measurements of neutron source emission rate (1999-2005): CCRI(III)-K9.AmBe

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, N.J.; Jones, L.N. [National Physical Laboratory (NPL), Teddington, (United Kingdom); Wang, Z.; Liu, Y.; Wang, Q.; Chen, X.; Luo, H.; Rong, C. [China Institute of Atomic Energy (CIAE), Beijing (China); Kralik, M. [Czech Metrology Institute (CMI), Praha, (Czech Republic); Park, H.; Choi, K.O. [Korea Research Institute of Standards and Science (KRISS), Daejeon, (Korea, Republic of); Pereira, W.W.; Da Fonseca, E.S. [National Laboratory of Metrology of Ionizing Radiation (LNMRI), Rio de Janeiro, (Brazil); Cassette, P. [Laboratoire National Henri Becquerel (LNE-LNHB), Paris, (France); Dewey, M.S. [National Institute of Standards and Technology (NIST), Gaithersburg, MD, (United States); Moiseev, N.N.; Kharitonov, I.A. [D I Mendeleyev Institute for Metrology (VNIIM), St Petersburg, (Russian Federation)

    2011-07-01

    Section III (neutron measurements) of the Comite Consultatif des Rayonnements Ionisants, CCRI, conducted a key comparison of primary measurements of the neutron emission rate of an {sup 241}Am-Be({alpha},n) radionuclide source. A single {sup 241}Am-Be({alpha},n) source was circulated to all the participants between 1999 and 2005. Eight laboratories participated - the CIAE (China), CMI (Czech Republic), KRISS (Republic of Korea), LNMRI (Brazil), LNE-LNHB (France), NIST (USA), NPL (UK) and the VNIIM (Russian Federation) - with the NPL making their measurements at the start and repeating them near the end of the exercise to verify the stability of the source. Each laboratory reported the emission rate into 4{pi} sr together with a detailed uncertainty budget. All participants used the manganese bath technique, with the VNIIM also making measurements using an associated particle technique. The CMI, KRISS, VNIIM, and later the NPL, also measured the anisotropy of the source although this was not a formal part of the comparison. The first draft report was released in May 2006 and having been discussed and modified by the participants and subsequently reviewed by the CCRI(III), the present paper is now the final report of the comparison. (authors)

  2. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  3. The assessment of cognitive errors using an observer-rated method.

    Science.gov (United States)

    Drapeau, Martin

    2014-01-01

    Cognitive Errors (CEs) are a key construct in cognitive behavioral therapy (CBT). Integral to CBT is that individuals with depression process information in an overly negative or biased way, and that this bias is reflected in specific depressotypic CEs which are distinct from normal information processing. Despite the importance of this construct in CBT theory, practice, and research, few methods are available to researchers and clinicians to reliably identify CEs as they occur. In this paper, the author presents a rating system, the Cognitive Error Rating Scale, which can be used by trained observers to identify and assess the cognitive errors of patients or research participants in vivo, i.e., as they are used or reported by the patients or participants. The method is described, including some of the more important rating conventions to be considered when using the method. This paper also describes the 15 cognitive errors assessed, and the different summary scores, including valence of the CEs, that can be derived from the method.

  4. Disciplining the children – ways of doing it, standpoints and generational relations

    Directory of Open Access Journals (Sweden)

    Saša Poljak

    2010-01-01

    Full Text Available Parents use different ways of disciplining the children in the family. The purpose of the research is to study ways, attitudes and intergenerational relations between disciplining the children in the family. One hundred and three parents appraised their ways of children disciplining, their attitudes towards the ways of disciplining, the context of experiencing, modes of implementing discipline and ways of disciplining of their mother and father when they were 10 years old. More than half of the parents describe the use of at least one of the ways of physical punishment respectively, at least one of the ways of psychical violence as a way of disciplining children in the family. Punishment ways of disciplining are connected with the experience of spousal conflict in the family, ineffectiveness, stress and the impulsive way of a response due to children disciplining. The acceptability of punishment and non-punishment ways of disciplining are positively connected with the frequency of use of this ways of disciplining. The research presented here shows a possibility that the use of a certain way of disciplining children in the family does not necessarily have a connection with a similar disciplining experience in the childhood. Corporal punishment is connected with the experience of other ways of punitive disciplining in the childhood, especially with the ways of disciplining used by mother.

  5. Pulsed dose rate brachytherapy – is it the right way?

    Directory of Open Access Journals (Sweden)

    Janusz Skowronek

    2010-10-01

    Full Text Available Pulsed dose rate (PDR-BT treatment is a brachytherapy modality that combines physical advantages of high-doserate (HDR-BT technology (isodose optimization, radiation safety with the radiobiological advantages of low-dose-rate (LDR-BT brachytherapy. Pulsed brachytherapy consists of using stronger radiation source than for LDR-BT and producing series of short exposures of 10 to 30 minutes in every hour to approximately the same total dose in the sameoverall time as with the LDR-BT. Modern afterloading equipment offers certain advantages over interstitial or intracavitaryinsertion of separate needles, tubes, seeds or wires. Isodose volumes in tissues can be created flexibly by a combinationof careful placement of the catheter and the adjustment of the dwell times of the computerized stepping source.Automatic removal of the radiation sources into a shielded safe eliminates radiation exposures to staff and visitors.Radiation exposure is also eliminated to the staff who formerly loaded and unloaded multiplicity of radioactive sources into the catheters, ovoids, tubes etc. This review based on summarized clinical investigations, analyses the feasibility and the background to introduce this brachytherapy technique and chosen clinical applications of PDR-BT.

  6. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  7. Sum-Rate Maximization of Coordinated Direct and Relay Systems

    DEFF Research Database (Denmark)

    Sun, Fan; Popovski, Petar; Thai, Chan

    2012-01-01

    Joint processing of multiple communication flows in wireless systems has given rise to a number of novel transmission techniques, notably the two-way relaying based on wireless network coding. Recently, a related set of techniques has emerged, termed coordinated direct and relay (CDR) transmissions......, where the constellation of traffic flows is more general than the two-way. Regardless of the actual traffic flows, in a CDR scheme the relay has a central role in managing the interference and boosting the overall system performance. In this paper we investigate the novel transmission modes, based...... on amplify-and-forward, that arise when the relay is equipped with multiple antennas and can use beamforming. We focus on one representative traffic type, with one uplink and one downlink users and consider the achievable sum-rate maximization relay beamforming. The beamforming criterion leads to a non...

  8. The Way of No-Way to Pursue Knowledge in Many Ways (Invited Paper

    Directory of Open Access Journals (Sweden)

    Jayanta Choudhury

    2014-12-01

    Full Text Available "The Tao that can be told is not the eternal Tao. The name that can be named is not the eternal name. The nameless is the beginning of heaven and earth. The named is the mother of ten thousand things. Ever desireless, one can see the mystery. Ever desiring, one can see the manifestations. These two spring from the same source but differ in name; this appears as darkness. Darkness within darkness. The gate to all mystery."–Lao Tsu (B.C. 2500 The above is an English translation of the first verse of the book "Tao Te Ching" by Lao Tsu. A working meaning of the word "Tao" is "way". The technical jargon "multidisciplinary research" or "interdisciplinary research" are research in many named established areas (i.e. chemistry, physics, sociology, mathematics, statistics, theology, philosophy, political science etc. by an individual or a group of individuals. This type of research has a mysterious common theme that cannot be isolated but is present in the manifestations in various research disciplines. One example of a common theme can be the goal of a new technological innovation. In this article, the problems and solutions of such endeavors are identified by practical analogies of living and nonliving natural phenomena to the above quoted verse by Lao Tsu.

  9. Regional analysis of big five personality factors and suicide rates in Russia.

    Science.gov (United States)

    Voracek, Martin

    2013-08-01

    Extending cross-national and intranational studies on possible aggregate-level associations between personality dimensions and suicide prevalence, this study examined the associations of the Big Five personality factors and suicide rates across 32 regions of the Russian Federation. Failing to replicate one key finding of similar geographic studies, namely, a correspondence of higher suicide rates with lower Agreeableness and Conscientiousness (i.e., higher Psychoticism) scores, higher suicide rates corresponded to higher Agreeableness scores. This effect was obtained with one available data source (regional-level Big Five ratings based on the National Character Survey), but not with another (based on the NEO-PI-R measure). All in all, regional suicide rates across Russia were dissociated from regional variation in personality dimensions.

  10. Mechanism and accounting treatment of interest rate swap

    Directory of Open Access Journals (Sweden)

    Prošić Danica

    2015-01-01

    Full Text Available Interest rate swap is a derivative which is today routinely used in the financial sector worldwide. As opposed to that, the swap market in Serbia is reduced to basic versions of interest rate swaps only, and is limited to the major users and providers of services in the financial market. Banks in Serbia have been introducing and promoting interest rate swaps as one of their services rather slowly, which can be deduced from various information on interest rate swaps and non-innovative offers of these instruments. On the other hand, companies are unable to recognize interest rate swaps as instruments of hedge against the negative effects of interest rate fluctuations, and a way to gain competitive edge in relation to other market participants. One of the obstacles for using interest rate swaps is unwillingness of companies to get informed and educated, and to enter new transactions. The volume of conducted swap transactions depends on the level of understanding on the part of their participants. Expansion of knowledge helps bridge the gap between theory and practice, thereby encouraging a more intensive implementation of interest rate swaps in the future.

  11. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  12. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  13. KEY PERFORMANCE INDICATORS DISCLOSURES BY THE INTEGRATED REPORTING

    Directory of Open Access Journals (Sweden)

    BOBITAN ROXANA-IOANA

    2016-02-01

    Full Text Available We are in a new era of corporate reporting where the corporate reporting landscape was changed. Institutional and small investors, financial analysts and other key stakeholders are demanding more information about long-term strategies and profitability of companies. Also, the increasing complexity of business models, growing awareness of climate change and resource scarcity and communication are expectations of the role of business in the 21st century and which the key of performance indicators (KPIs is. The companies must change the way these KPIs are being incorporated throughout the annual report and how these are linked to the company’s strategy and business model, their risks and risk mitigation, and their incentive schemes. Regarding this, integrated reporting, continue to gain momentum, the spotlight on the depth, breadth and quality of KPIs being reported will only strengthen. The aim of this discussion paper is to describe which are the most important key performance indicators in sprit of integrating reporting. A good and very known example for the integrated reporting is Philips Electronics, the Dutch healthcare and lighting company, a pioneer that embrace this concept, and the paper make an analysis of the most important key performance indicators.

  14. Thermonuclear 19F(p, {{\\boldsymbol{\\alpha }}}_{0})16O reaction rate

    Science.gov (United States)

    He, Jian-Jun; Lombardo, Ivano; Dell'Aquila, Daniele; Xu, Yi; Zhang, Li-Yong; Liu, Wei-Ping

    2018-01-01

    The thermonuclear 19F(p, {{{α }}}0)16O reaction rate in the temperature region 0.007-10 GK has been derived by re-evaluating the available experimental data, together with the low-energy theoretical R-matrix extrapolations. Our new rate deviates by up to about 30% compared to the previous results, although all rates are consistent within the uncertainties. At very low temperature (e.g. 0.01 GK) our reaction rate is about 20% lower than the most recently published rate, because of a difference in the low energy extrapolated S-factor and a more accurate estimate of the reduced mass used in the calculation of the reaction rate. At temperatures above ˜1 GK, our rate is lower, for instance, by about 20% around 1.75 GK, because we have re-evaluated the previous data (Isoya et al., Nucl. Phys. 7, 116 (1958)) in a meticulous way. The present interpretation is supported by the direct experimental data. The uncertainties of the present evaluated rate are estimated to be about 20% in the temperature region below 0.2 GK, and are mainly caused by the lack of low-energy experimental data and the large uncertainties in the existing data. Asymptotic giant branch (AGB) stars evolve at temperatures below 0.2 GK, where the 19F(p, {{α }})16O reaction may play a very important role. However, the current accuracy of the reaction rate is insufficient to help to describe, in a careful way, the fluorine over-abundances observed in AGB stars. Precise cross section (or S factor) data in the low energy region are therefore needed for astrophysical nucleosynthesis studies. Supported by National Natural Science Foundation of China (11490562, 11490560, 11675229) and National Key Research and Development Program of China (2016YFA0400503)

  15. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  16. Collaborative testing for key-term definitions under representative conditions: Efficiency costs and no learning benefits.

    Science.gov (United States)

    Wissman, Kathryn T; Rawson, Katherine A

    2018-01-01

    Students are expected to learn key-term definitions across many different grade levels and academic disciplines. Thus, investigating ways to promote understanding of key-term definitions is of critical importance for applied purposes. A recent survey showed that learners report engaging in collaborative practice testing when learning key-term definitions, with outcomes also shedding light on the way in which learners report engaging in collaborative testing in real-world contexts (Wissman & Rawson, 2016, Memory, 24, 223-239). However, no research has directly explored the effectiveness of engaging in collaborative testing under representative conditions. Accordingly, the current research evaluates the costs (with respect to efficiency) and the benefits (with respect to learning) of collaborative testing for key-term definitions under representative conditions. In three experiments (ns = 94, 74, 95), learners individually studied key-term definitions and then completed retrieval practice, which occurred either individually or collaboratively (in dyads). Two days later, all learners completed a final individual test. Results from Experiments 1-2 showed a cost (with respect to efficiency) and no benefit (with respect to learning) of engaging in collaborative testing for key-term definitions. Experiment 3 evaluated a theoretical explanation for why collaborative benefits do not emerge under representative conditions. Collectively, outcomes indicate that collaborative testing versus individual testing is less effective and less efficient when learning key-term definitions under representative conditions.

  17. Vagus nerve stimulation ameliorated deficits in one-way active avoidance learning and stimulated hippocampal neurogenesis in bulbectomized rats.

    Science.gov (United States)

    Gebhardt, Nils; Bär, Karl-Jürgen; Boettger, Michael K; Grecksch, Gisela; Keilhoff, Gerburg; Reichart, Rupert; Becker, Axel

    2013-01-01

    Vagus nerve stimulation (VNS) has been introduced as a therapeutic option for treatment-resistant depression. The neural and chemical mechanisms responsible for the effects of VNS are largely unclear. Bilateral removal of the olfactory bulbs (OBX) is a validated animal model in depression research. We studied the effects of vagus nerve stimulation (VNS) on disturbed one-way active avoidance learning and neurogenesis in the hippocampal dentate gyrus of rats. After a stimulation period of 3 weeks, OBX rats acquired the learning task as controls. In addition, the OBX-related decrease of neuronal differentiated BrdU positive cells in the dentate gyrus was prevented by VNS. This suggests that chronic VNS and changes in hippocampal neurogenesis induced by VNS may also account for the amelioration of behavioral deficits in OBX rats. To the best of our knowledge, this is the first report on the restorative effects of VNS on behavioral function in an animal model of depression that can be compared with the effects of antidepressants. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Seven Ways to Make Your Training Department One of the Best.

    Science.gov (United States)

    Vander Linde, Karen; And Others

    1997-01-01

    Explains how training organizations in high-performance companies such as Motorola are different from those in low-performing ones. Identifies management practices: customer focus, training closer to customers, leadership, employee involvement, innovation, process improvement, improvement measurement, and change management. (JOW)

  19. Rapid movement of wastewater from on-site disposal systems into surface waters in the lower Florida Keys

    Science.gov (United States)

    Paul, John H.; McLaughlin, Molly R.; Griffin, Dale W.; Lipp, Erin K.; Stokes, Rodger; Rose, Joan B.

    2000-01-01

    Viral tracer studies have been used previously to study the potential for wastewater contamination of surface marine waters in the Upper and Middle Florida Keys. Two bacteriophages, the marine bacteriophage φHSIC and the Salmonella phage PRD1, were used as tracers in injection well and septic tank studies in Saddlebunch Keys of the Lower Florida Keys and in septic tank studies in Boot Key Harbor, Marathon, of the Middle Keys. In Boot Key Harbor, both phages were detected in a canal adjacent to the seeded septic tank within 3 h 15 min of the end of the seed period. The tracer was then detected at all sampling sites in Boot Key Harbor, including one on the opposite side of U. S. Highway 1 in Florida Bay, and at an Atlantic Ocean beach outside Boot Key Harbor. Rates of migration based on first appearance of the phage ranged from 1.7 to 57.5 m h-1. In Saddlebunch Keys, φHSIC and PRD1 were used to seed a residential septic tank and a commercial injection well. The septic tank tracer was not found in any surface water samples. The injection well tracer was first detected at a site most distant from the seed site, a channel that connected Sugarloaf Sound with the Atlantic Ocean. The rate of tracer migration from the injection well to this channel ranged from 66.8 to 141 m h-1. Both tracer studies showed a rapid movement of wastewater from on-site sewage treatment and disposal systems in a southeasterly direction toward the reef tract and Atlantic Ocean, with preferential movement through tidal channels. These studies indicate that wastewater disposal systems currently in widespread use in the Florida Keys can rapidly contaminate the marine environment.

  20. Key Performance Indicators (KPI) Developing, Implementing, and Using Winning KPIs

    CERN Document Server

    Parmenter, David

    2010-01-01

    An in-depth look at how to create and use key performance indicators (KPIs), from the King of KPIs â€" now updated and expanded! By exploring measures that have transformed businesses, David Parmenter has developed a methodology that is breathtaking in its simplicity and yet profound in its impact. Now in an updated and expanded Second Edition, Key Performance Indicators is a proactive guide representing a significant shift in the way KPIs are developed and used, with an abundance of implementation tools, including: The four foundation stones that lead the development and use of KPIs; A 12-ste

  1. The MycoKey 3.1 DVD. Included in Knudsen, H. & Vesterholt, J. (eds.). Funga Nordica

    DEFF Research Database (Denmark)

    2008-01-01

    . It is, of course, also possible to do a direct search on a name in MycoKey in order to find a genus or a particular species. MycoKey gives access to more than 4,000 illustrations of fungi and more than 17,000 links to references. From within the genera you can also open the Funga Nordica keys in a a pdf-viwer......MycoKey enables the user to identify fungal genera (fruitbody forming Basidiomycota and discomycetes) by means of a digital, synoptical key. This key offers a very different way of choosing between genera than the traditional analytical key and the the two approaches complete each other nicely...

  2. Estimating reaction rate constants from a two-step reaction: a comparison between two-way and three-way methods

    NARCIS (Netherlands)

    Bijlsma, S.; Smilde, A. K.

    2000-01-01

    In this paper, two different spectral datasets are used in order to estimate reaction rate constants using different algorithms. Dataset 1 consists of short-wavelength near-infrared (SW NIR) spectra taken in time of the two-step epoxidation of 2,5-di-tert-butyl-1,4-benzoquinone using tert-butyl

  3. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    International Nuclear Information System (INIS)

    Hayashi, Masahito; Nakayama, Ryota

    2014-01-01

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  4. Relationship among reaction rate, release rate and efficiency of nanomachine-based targeted drug delivery.

    Science.gov (United States)

    Zhao, Qingying; Li, Min; Luo, Jun

    2017-12-04

    In nanomachine applications towards targeted drug delivery, drug molecules released by nanomachines propagate and chemically react with tumor cells in aqueous environment. If the nanomachines release drug molecules faster than the tumor cells react, it will result in loss and waste of drug molecules. It is a potential issue associated with the relationship among reaction rate, release rate and efficiency. This paper aims to investigate the relationship among reaction rate, release rate and efficiency based on two drug reception models. We expect to pave a way for designing a control method of drug release. We adopted two analytical methods that one is drug reception process based on collision with tumors and another is based on Michaelis Menten enzymatic kinetics. To evaluate the analytical formulations, we used the well-known simulation framework N3Sim to establish simulations. The analytical results of the relationship among reaction rate, release rate and efficiency is obtained, which match well with the numerical simulation results in a 3-D environment. Based upon two drug reception models, the results of this paper would be beneficial for designing a control method of nanomahine-based drug release.

  5. Strategic Branching: Is There a Way out of a Dead End?

    Directory of Open Access Journals (Sweden)

    Pavel Aleksandrovich Minakir

    2017-09-01

    Full Text Available The article discusses problems of choosing a strategy of Russia’s development. It is shown that the issue is not with choosing a rational way of economic behavior in macrosphere but ways of development in the economy that continues to close, all the mechanisms and relationships of which are oriented at the economy that functions in global production cycle. The article states that Russian economy is in systemic crisis that is a classical Marx’s crisis of overproduction when supporting the ratio and fulfilling balanced obligations (that became state’s obligations after the triumph of state monopoly is only possible in case of preserving the existing ratio of ‘prices’ (rent income of budget, savings, final expenses, corporate profits, ruble rate, interest rate, etc.. The main problem is identified as internal factors: lack of effective arbitration, stasis of political and social formats, conflict between pseudo-market and state-monopolistic sectors of economy; not the external ones, the existence of which is objective. Therefore numerous discussions about a new strategy of development that were supposed to establish a new effective economy are, in fact, raising a question of necessity of changing the meta-goal, that in turn will lead to the necessity of discussing the issue of content and form of social development in general

  6. Iris recognition based on key image feature extraction.

    Science.gov (United States)

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  7. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    International Nuclear Information System (INIS)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-01

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70 km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment

  8. Multi-way multi-group segregation and diversity indices.

    Science.gov (United States)

    Gorelick, Root; Bertram, Susan M

    2010-06-01

    How can we compute a segregation or diversity index from a three-way or multi-way contingency table, where each variable can take on an arbitrary finite number of values and where the index takes values between zero and one? Previous methods only exist for two-way contingency tables or dichotomous variables. A prototypical three-way case is the segregation index of a set of industries or departments given multiple explanatory variables of both sex and race. This can be further extended to other variables, such as disability, number of years of education, and former military service. We extend existing segregation indices based on Euclidean distance (square of coefficient of variation) and Boltzmann/Shannon/Theil index from two-way to multi-way contingency tables by including multiple summations. We provide several biological applications, such as indices for age polyethism and linkage disequilibrium. We also provide a new heuristic conceptualization of entropy-based indices. Higher order association measures are often independent of lower order ones, hence an overall segregation or diversity index should be the arithmetic mean of the normalized association measures at all orders. These methods are applicable when individuals self-identify as multiple races or even multiple sexes and when individuals work part-time in multiple industries. The policy implications of this work are enormous, allowing people to rigorously test whether employment or biological diversity has changed.

  9. Money market rates and implied CCAPM rates: some international evidence

    OpenAIRE

    Yamin Ahmad

    2004-01-01

    New Neoclassical Synthesis models equate the instrument of monetary policy to the implied CCAPM rate arising from an Euler equation. This paper identifies monetary policy shocks within six of the G7 countries and examines the movement of money market and implied CCAPM rates. The key result is that an increase in the nominal interest rate leads to a fall in the implied CCAPM rate. Incorporating habit still yields the same result. The findings suggest that the movement of these two rates implie...

  10. The influence of sovereign credit ratings on corporate credit ratings.

    OpenAIRE

    Umutoni, Liliane

    2017-01-01

    Credit ratings have a key role in modern financial markets as they communicate crucial information on the creditworthiness of a debt issuer to investors and regulators. These credit ratings are mostly determined by three rating agencies, namely Standard & Poor’s, Moody’s and Fitch, even though, the credit rating industry counts a dozen of recognized rating agencies. Indeed, the three agencies have become the market leaders with a market share of 94.3% on the U.S market (Bloomberg, 2015) and 9...

  11. Two-way QKD with single-photon-added coherent states

    Science.gov (United States)

    Miranda, Mario; Mundarain, Douglas

    2017-12-01

    In this work we present a two-way quantum key distribution (QKD) scheme that uses single-photon-added coherent states and displacement operations. The first party randomly sends coherent states (CS) or single-photon-added coherent states (SPACS) to the second party. The latter sends back the same state it received. Both parties decide which kind of states they are receiving by detecting or not a photon on the received signal after displacement operations. The first party must determine whether its sent and received states are equal; otherwise, the case must be discarded. We are going to show that an eavesdropper provided with a beam splitter gets the same information in any of the non-discarded cases. The key can be obtained by assigning 0 to CS and 1 to SPACS in the non-discarded cases. This protocol guarantees keys' security in the presence of a beam splitter attack even for states with a high number of photons in the sent signal. It also works in a lossy quantum channel, becoming a good bet for improving long-distance QKD.

  12. Retrospective ratings of emotions: the effects of age, daily tiredness, and personality

    Directory of Open Access Journals (Sweden)

    Aire eMill

    2016-01-01

    Full Text Available Remembering the emotions we have experienced in the past is the core of one´s unique life-experience. However, there are many factors, both at the state and trait level that can affect the way past feelings are seen. The main aim of the current study was to examine the impact of individual differences on systematic biases in retrospective ratings compared to the momentary experience of basic emotions such as sadness, fear, happiness, and anger. To this end, an experience sampling study across two weeks was conducted using a younger and an older age-group; the experience of momentary emotions was assessed on 7 randomly determined occasions per day, the retrospective ratings being collected at the end of each day about that day, as well as at the end of the study about the previous two weeks. The results indicated that age and daily tiredness have significant effects on retrospective emotion ratings over a one-day period (state level, enhancing the retrospective ratings of negative emotions and decreasing the ratings of felt happiness. Whereas personality traits influence the more long-term emotion experience (trait level, with all Big Five personality traits having selective impact on retrospective emotion ratings of fear, sadness, happiness, and anger. Findings provide further evidence about the systematic biases in retrospective emotion ratings, suggesting that, although retrospective ratings are based on momentary experience, daily tiredness and personality traits systematically influence the way in which past feelings are seen.

  13. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  14. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  15. Three ways of assembling a house

    DEFF Research Database (Denmark)

    Beim, Anne; Nielsen, Jesper; Vibæk, Kasper Sánchez

    The Scandinavian construction industry is characterised by high quality craftsmanship, but also by an array of highly industrialised, but not always coordinated building systems. This book aims to shed some light on these systems and their underlying concepts. By looking at both the systems...... themselves, the way they are produced and the business models behind them, the systems and concepts are assessed in their broader organisational context and not just as physical manifestations of their design intentions. Acknowledging that there is more than one possible way of enhancing the application...

  16. arXiv Status of rates and rate equations for thermal leptogenesis

    CERN Document Server

    Biondini, Simone; Brambilla, Nora; Garny, Mathias; Ghiglieri, Jacopo; Hohenegger, Andreas; Laine, Mikko; Mendizabal, Sebastian; Millington, Peter; Salvio, Alberto; Vairo, Antonio

    2018-02-28

    In many realizations of leptogenesis, heavy right-handed neutrinos play the main role in the generation of an imbalance between matter and antimatter in the early Universe. Hence, it is relevant to address quantitatively their dynamics in a hot and dense environment by taking into account the various thermal aspects of the problem at hand. The strong washout regime offers an interesting framework to carry out calculations systematically and reduce theoretical uncertainties. Indeed, any matter-antimatter asymmetry generated when the temperature of the hot plasma $T$ exceeds the right-handed neutrino mass scale $M$ is efficiently erased, and one can focus on the temperature window $T \\ll M$. We review recent progresses in the thermal field theoretic derivation of the key ingredients for the leptogenesis mechanism: the right-handed neutrino production rate, the CP asymmetry in the heavy-neutrino decays and the washout rates. The derivation of evolution equations for the heavy-neutrino and lepton-asymmetry number...

  17. Twenty-One Ways to Use Music in Teaching the Language Arts.

    Science.gov (United States)

    Cardarelli, Aldo F.

    Twenty-one activities that integrate music and the language arts in order to capitalize on children's interests are described in this paper. Topics of the activities are as follows: alphabetical order, pantomime, vocabulary building from words of a favorite song, words that are "the most (whatever)" from songs, mood words, a configuration clue…

  18. Toxicology in the 21st century - Working our way towards a visionary reality

    NARCIS (Netherlands)

    Berg, N.; Wever, B.de; Fuchs, H.W.; Gaca, M.; Krul, C.A.M.; Roggen, E.L.

    2011-01-01

    In November 2009 the In Vitro Testing Industrial Platform (IVTIP) organized a meeting entitled '. Toxicology in the 21st century - working our way towards a visionary reality'. Participating delegates included scientists, key opinion leaders, developers and users of 3Rs-related tests and testing

  19. Development of authentication code for multi-access optical code division multiplexing based quantum key distribution

    Science.gov (United States)

    Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.

    2018-05-01

    One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.

  20. A Review of RSA and Public-Key Cryptosystems | Rabah | Botswana ...

    African Journals Online (AJOL)

    ... study and analyze the RSA cryptosystems – a public-key cryptographic algorithm - a system that uses two sets of keys; one for encryption and the other for decryption. Key Words: Public-key cryptography, DH, RSA, Internet Security and attacks, Digital Signature, Message digest, Authentication, Secure Socket Layer (SSL)